Fortinet has put in place a temporary fix to deal with a new zero-day exploit that hackers are using right now This article explores forti gate exploits. . Fortinet said on Saturday that there was a big security problem with their FortiClient Endpoint Management Server (EMS) software.
They called this flaw a "improper access control flaw" and gave it a CVSS score of 9.1. It could let attackers who aren't logged in run code or commands through malicious requests. According to Fortinet's statement on ZeroOwl, the attack is thought to have come from a single exploit, and its effects were limited. On Monday, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-35616 to its list of Known Exploited Vulnerabilities (KEV).
By April 9, federal civilian executive branch (FCEB) agencies must fix or lessen the impact of the Forticlient zero-day flaw. They usually have two weeks to do this. Researchers from AWS found that an attacker took advantage of FortiGate devices' security flaws, such as weak passwords, open ports, and other issues.
The attack happened because the Forti gateways' security software had holes in it. The attacker also used weak passwords and open ports to get in. The attackers used a mix of methods, such as man-in-the-middle attacks and brute-force attacks on Forti Gate devices, as well as a flaw in the security software that protects Fortigate devices. You can read the whole report at http://www.awesome.com/news/features/forti-gate-exploits-weak-credentials-and-exposes-port-vulnerabilities-by-exploit-ingests-on-fortiGate-devices.html.
Visit the official Forti Gateway website for more information.












