Fortinet

Vendor security scorecard – 1 CVEs in the selected period

Period: 30d 90d 6m 1y All
Risk 68
1
CVEs
1
Critical
0
High
1
KEV
1
PoC
1
Unpatched C/H
0.0%
Patch Rate
0.0%
Avg EPSS

Severity Breakdown

CRITICAL
1
HIGH
0
MEDIUM
0
LOW
0

Monthly CVE Trend

Top Risky CVEs

CVE Summary Severity CVSS EPSS Priority Signals
CVE-2026-35616 Remote code execution in Fortinet FortiClientEMS versions 7.4.5 through 7.4.6 allows unauthenticated attackers to execute arbitrary code via crafted network requests. The vulnerability stems from improper access control (CWE-284) and requires no user interaction or privileges (CVSS PR:N). With a CVSS score of 9.1 (Critical) and low attack complexity, this represents a severe exposure for organizations using affected FortiClientEMS versions. The CVSS temporal metrics indicate functional exploit code exists (E:F) with an official fix available (RL:O), making this a high-priority patching target despite no confirmed active exploitation (not present in CISA KEV). CRITICAL 9.8 0.0% 124
KEV PoC No patch

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy