<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Endpoint-Management on cybercrime.club</title><link>https://cybercrime.club/tags/endpoint-management/</link><description>Recent content in Endpoint-Management on cybercrime.club</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 04 Apr 2026 18:09:00 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/endpoint-management/index.xml" rel="self" type="application/rss+xml"/><item><title>FortiClient EMS Zero-Day Under Active Exploitation — Emergency Hotfixes Released (CVE-2026-35616)</title><link>https://cybercrime.club/posts/forticlient-ems-cve-2026-35616-zero-day-api-bypass/</link><pubDate>Sat, 04 Apr 2026 18:09:00 -0400</pubDate><guid>https://cybercrime.club/posts/forticlient-ems-cve-2026-35616-zero-day-api-bypass/</guid><description>&lt;p>Fortinet disclosed today that a critical zero-day vulnerability in FortiClient Endpoint Management Server (EMS) is under active exploitation. Tracked as &lt;strong>CVE-2026-35616&lt;/strong> with a CVSS score of &lt;strong>9.1&lt;/strong>, the flaw allows unauthenticated attackers to bypass API authentication and authorization controls, leading to arbitrary code execution on affected servers.&lt;/p>
&lt;p>Emergency hotfixes are available now. If you run FortiClient EMS 7.4.5 or 7.4.6, stop reading and go patch.&lt;/p>
&lt;h2 id="what-happened">What Happened&lt;/h2>
&lt;p>Fortinet&amp;rsquo;s PSIRT published advisory &lt;a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099">FG-IR-26-099&lt;/a> confirming that attackers are actively exploiting CVE-2026-35616 in the wild. A public proof-of-concept exploit has appeared on GitHub, which means the window for opportunistic exploitation is wide open.&lt;/p></description></item></channel></rss>