Aggregator
【培训】开源情报分析师实战能力培训班-4月成都开班
【情报实战】美军营救F-15E“攻击鹰”(Strike Eagle) 战斗机飞行员的位置在哪里?
Gunra
You must login to view this content
BKA unmasks two REvil Ransomware operators behind 130+ German attacks
Anubis
You must login to view this content
New GitHub Actions Attack Chain Uses Fake CI Updates to Exfiltrate Secrets and Tokens
A new attack campaign is actively targeting open-source repositories on GitHub by carefully disguising malicious code as completely routine CI build configuration updates. The campaign, prt-scan exploits a widely misused GitHub Actions workflow trigger to steal sensitive tokens, credentials, and cloud secrets from developers who unknowingly trigger the fraudulent pull requests. The attack first appeared […]
The post New GitHub Actions Attack Chain Uses Fake CI Updates to Exfiltrate Secrets and Tokens appeared first on Cyber Security News.
Cloudflare Targets WordPress With New AI-Powered EmDash CMS
Chrome 148 将延迟加载视频和音频以改进性能
CVE-2026-5705 | code-projects Online Hotel Booking 1.0 Booking Endpoint /booknow.php roomname cross site scripting
CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild
Exploitation has been observed for CVE-2026-35616, a critical improper access control zero-day vulnerability affecting Fortinet FortiClientEMS devices.
Key takeaways:- CVE-2026-35616, an improper access control vulnerability, has been exploited in the wild as a zero-day.
- Public exploit code has been identified and Fortinet products have a long history of targeting by malicious actors.
- Hotfixes have been released by Fortinet and should be applied as soon as possible to protect from this threat.
Update April 6: The blog has been updated to include that CVE-2026-35616 has been added to the CISA KEV.
Click here to review the change historyApril 6:The blog has been updated to include that CVE-2026-35616 has been added to the CISA KEV.
On April 4, Fortinet published a security advisory (FG-IR-26-099) for CVE-2026-35616, a critical improper access control vulnerability affecting Fortinet FortiClientEMS.
CVEDescriptionCVSSv3CVE-2026-35616Fortinet FortiClientEMS Improper Access Control Vulnerability9.1AnalysisCVE-2026-35616 is a critical improper access control vulnerability affecting Fortinet FortiClientEMS. A remote, unauthenticated attacker can exploit this flaw to execute arbitrary code using specially crafted requests which bypass API authentication.
While no attribution has been provided as of the time this blog was published, the advisory from Fortinet confirms that exploitation has been observed. The advisory credits Simo Kohonen from Defused and Nguyen Duc Anh, who reported the vulnerability to Fortinet. On April 4, Defused released a Linkedin post confirming their observations of zero-day exploitation of this flaw.
At the time this blog was published, Tenable Research has classified this flaw as a Vulnerability of Interest according to our Vulnerability Watch classification system.
Historical Exploitation of Fortinet Devices
Fortinet vulnerabilities have historically been common targets for cyber attackers, with 24 Fortinet CVEs currently on the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) list, with 13 of those being linked to ransomware campaigns. Targeting of Fortinet flaws have been attributed to a number of threat actors, including Salt Typhoon.
Just over a week ago, Defused reported exploitation in the wild for CVE-2026-21643, SQL injection vulnerability affecting FortiClientEMS. Fortinet’s advisory now reflects that exploitation has been observed but as of April 6, the flaw has not yet been added to the KEV.
🚨 Fortinet Forticlient EMS CVE-2026-21643 - currently marked as not exploited on CISA and other Known Exploited Vulnerabilities (KEV) lists - has seen first exploitation already 4 days ago according to our data
Attackers can smuggle SQL statements through the "Site"-header… pic.twitter.com/pHwl2qMVsj
— Defused (@DefusedCyber) March 28, 2026
At the time this blog was published on April 6, CVE-2026-35616 had not been added to the KEV, however shortly after publication, the KEV was updated to include CVE-2026-35616.
As Fortinet devices have been popular targets for attackers, the Tenable Research Special Operations Team (RSO) has authored several blogs about vulnerabilities affecting these devices. The following table outlines some of the most impactful Fortinet vulnerabilities in recent years.
CVEDescriptionPublishedTenable BlogCVE-2025-64155Fortinet FortiSIEM Command Injection VulnerabilityJanuary 2026CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection VulnerabilityCVE-2025-64446Fortinet FortiWeb Path Traversal VulnerabilityNovember 2025CVE-2025-64446: Fortinet FortiWeb Zero-Day Path Traversal Vulnerability Exploited in the WildCVE-2025-25256Fortinet FortiSIEM Command Injection VulnerabilityAugust 2025CVE-2025-25256: Proof of Concept Released for Critical Fortinet FortiSIEM Command Injection VulnerabilityCVE-2025-32756Fortinet FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera Arbitrary Code Execution VulnerabilityMay 2025CVE-2025-32756: Zero-Day Vulnerability in Multiple Fortinet Products Exploited in the WildCVE-2024-55591Fortinet Authentication Bypass in FortiOS and FortiProxyJanuary 2025CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the WildCVE-2024-21762Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpndFebruary 2024CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN VulnerabilityCVE-2023-27997FortiOS and FortiProxy Heap-Based Buffer Overflow VulnerabilityJune 2023CVE-2023-27997: Heap-Based Buffer Overflow in Fortinet FortiOS and FortiProxy SSL-VPN (XORtigate)CVE-2022-42475FortiOS and FortiProxy Heap-Based Buffer Overflow VulnerabilityDecember 2022CVE-2022-42475: Fortinet Patches Zero Day in FortiOS SSL VPNsAA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475CVE-2022-40684FortiOS and FortiProxy Authentication Bypass VulnerabilityOctober 2022CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxyProof of conceptAs of April 6, a public proof-of-concept has been identified on GitHub, however Tenable Research has not yet verified the exploit. Given the past exploitation of Fortinet devices and published exploit code for several past vulnerabilities, we anticipate that exploitation will continue to increase as additional exploits are released.
SolutionThe following table details the affected and fixed versions of Fortinet FortiClientEMS devices for CVE-2026-35616:
Product VersionAffected RangeFixed VersionFortiClientEMS 7.2Not affectedN/AFortiClientEMS 7.47.4.5 through 7.4.67.4.7 or aboveAs of April 6, Fortinet has provided a hotfix for FortiClient EMS 7.4.5 and 7.4.6 to address this vulnerability. Version 7.4.7 has not yet been released, but will be an upcoming release that addresses this vulnerability. Until that release, the hotfix must be applied to be protected against this vulnerability. We recommend reviewing the security advisory as Fortinet may make future updates to the document.
Identifying affected systemsA list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2026-35616 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.
Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Fortinet devices by using the following subscription:
Get more informationJoin Tenable's Research Special Operations (RSO) Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
Akira
You must login to view this content
Хватит сидеть дома! Нейросеть лучше вас знает, как вам стоит провести свой день. Просто доверьтесь ей
Submit #786325: code-projects Online Hotel Booking IN PHP 1.0 Cross Site Scripting [Accepted]
CVE-2026-30078 | OpenAirInterface CN5G AMF up to 2.2.0 Procedure Code/PDU-Type ngap_message_callback.hpp ngap_message_decoded_callback denial of service (Issue 74)
CVE-2026-3524 | Mattermost Legal Hold Plugin up to 1.1.4 API authorization
Shadow AI in Healthcare Is Here to Stay
DPRK Cyber Program Uses Modular Malware Strategy to Evade Attribution and Survive Takedowns
North Korea’s cyber program has fundamentally shifted how it builds and deploys malware. Rather than relying on one all-purpose hacking tool, the regime has assembled a fragmented ecosystem of purpose-built malware families, each aligned to a specific mission. This shift grew out of more than a decade of international sanctions, law enforcement pressure, and increasingly […]
The post DPRK Cyber Program Uses Modular Malware Strategy to Evade Attribution and Survive Takedowns appeared first on Cyber Security News.
Qilin
You must login to view this content
Qilin
You must login to view this content