07 Apr Critical FortiClient EMS Zero-Day CVE-2026-35616 Actively Exploited: Urgent Security Alert for Dental Practices
A critical zero-day vulnerability in Fortinet FortiClient Endpoint Management Server (EMS) is being actively exploited by attackers, prompting urgent security alerts across healthcare and dental practice networks. The vulnerability, tracked as CVE-2026-35616 with a critical CVSS score of 9.1, allows unauthenticated attackers to bypass API authentication and authorization controls.
Immediate Threat to Dental Practice Networks
Dental practices relying on Fortinet security infrastructure face immediate risk from this actively exploited vulnerability. The flaw affects FortiClient EMS versions 7.4.5 and 7.4.6, enabling remote attackers to execute unauthorized code and commands through specially crafted API requests without any authentication requirements.

This represents the second critical FortiClient EMS vulnerability under active exploitation in recent weeks, following CVE-2026-21643, indicating coordinated targeting of Fortinet infrastructure by threat actors.
Technical Analysis and Attack Vectors
CVE-2026-35616 exploits improper access control mechanisms within FortiClient EMS, allowing attackers to:
- Bypass pre-authentication API security controls
- Execute arbitrary code on affected systems
- Escalate privileges within network environments
- Potentially establish persistent access for lateral movement
Security researchers at Defused Cyber first identified active exploitation attempts, with Fortinet quickly confirming the threat and releasing emergency hotfixes. The vulnerability does not affect the 7.2 branch, suggesting targeted exploitation of newer deployment architectures.
Dental Practice Exposure and HIPAA Implications
For dental practices, this vulnerability poses significant risks to patient data security and HIPAA compliance. FortiClient EMS manages endpoint security across practice networks, controlling access to:
- Electronic health record (EHR) systems
- Digital imaging and radiography workstations
- Patient management databases
- Financial and billing systems

Successful exploitation could result in unauthorized access to protected health information (PHI), potentially triggering mandatory breach notifications and regulatory penalties under HIPAA requirements.
Immediate Response Requirements
Dental practices using affected FortiClient EMS versions must take immediate action:
Emergency Patching
- Apply Fortinet hotfixes for versions 7.4.5 and 7.4.6 immediately
- Schedule emergency maintenance windows for critical security updates
- Verify hotfix installation across all EMS installations
- Monitor for upcoming FortiClient EMS 7.4.7 release with permanent fix
Network Security Measures
- Implement additional network segmentation around EMS servers
- Deploy intrusion detection monitoring for API exploitation attempts
- Review and strengthen API access logging and alerting
- Conduct emergency vulnerability scans across network infrastructure
Incident Response Planning
- Document all remediation activities for compliance reporting
- Prepare breach notification procedures if exploitation is detected
- Coordinate with cybersecurity insurance providers regarding coverage
- Establish communication protocols for patient and staff notifications
Long-Term Security Recommendations
This incident highlights critical vulnerabilities in endpoint management infrastructure. Dental practices should consider:
- Implementing multi-vendor security approaches to reduce single points of failure
- Establishing rapid patch management procedures for critical infrastructure
- Deploying additional monitoring and threat detection capabilities
- Conducting regular penetration testing of network security controls
- Training staff on emergency response procedures for security incidents
Conclusion
The active exploitation of CVE-2026-35616 represents a significant and immediate threat to dental practice cybersecurity. With nearly 2,000 publicly exposed FortiClient EMS instances identified by security researchers, the attack surface remains substantial. Practices must prioritize emergency patching while implementing comprehensive security monitoring to detect potential compromise.
The rapid succession of actively exploited FortiClient vulnerabilities suggests coordinated threat actor campaigns targeting enterprise security infrastructure. Dental practices should treat this as a wake-up call to strengthen their overall cybersecurity posture and incident response capabilities.