WEEKLY ROUNDUP | PATCH NOW
Active Threat14 min read

This Week's 4 Must-Patch Threats: FortiClient EMS Zero-Day to Rockstar's 78M Breach

A CVSS 9.1 pre-auth code execution flaw in Fortinet's endpoint management server was exploited for six days before any advisory existed. Plus: 78.6 million records leaked from Rockstar Games through a third-party cloud compromise, 53 DDoS-for-hire services seized, and CERT-UA's new threat actor targeting healthcare.

9.1
CVSS score — FortiClient EMS CVE-2026-35616
78.6M
Records leaked in Rockstar Games data breach
53
DDoS-for-hire domains seized in Operation PowerOFF
6 days
FortiClient EMS exploited before Fortinet published advisory

Three separate attack vectors reached confirmed exploitation status this week, and at least one was weaponised before the vendor knew it was public. The headline: CVE-2026-35616, a pre-authentication API access bypass in Fortinet's FortiClient Endpoint Management Server, carries a CVSS score of 9.1 and was actively exploited in production environments beginning March 31, 2026 — six days before Fortinet published its advisory and CISA simultaneously added the vulnerability to the Known Exploited Vulnerabilities catalog.

FortiClient EMS is the centralised management server for Fortinet's enterprise endpoint security platform. It deploys configuration profiles to FortiClient agents, manages compliance policies, enforces endpoint posture checks, and serves as the administrative hub from which endpoint detection and response settings are controlled. A successful exploitation of CVE-2026-35616 does not merely compromise one server — it grants an unauthenticated attacker the ability to modify endpoint security configurations across every device managed by that EMS instance, from detection rules to quarantine policies to application control settings. If your endpoint security stack runs on FortiClient, this is an unauthenticated path to disabling it.

The week also delivered the confirmation of the Rockstar Games breach: ShinyHunters extracted 78.6 million records via Anodot, a third-party cloud cost-monitoring service with authenticated access to Rockstar's Snowflake data warehouse. An international law enforcement operation — Operation PowerOFF — seized 53 DDoS-for-hire domains used by over 75,000 registered criminal users. And CERT-UA disclosed a new threat cluster targeting emergency healthcare infrastructure. Here is the full picture and what you need to do before Monday.

How CVE-2026-35616 Works: Pre-Authentication API Bypass in FortiClient EMS

CVE-2026-35616 is a CWE-284 (Improper Access Control) vulnerability in Fortinet FortiClient EMS versions 7.4.5 and 7.4.6. The flaw allows an unauthenticated attacker to send specially crafted API requests that the EMS server processes as valid authenticated commands — bypassing the authentication layer entirely and enabling arbitrary code execution or command execution with the privileges of the running EMS service account.

FortiClient EMS is a Windows-based server application that serves as the central management plane for enterprise FortiClient endpoint deployments. It receives configuration instructions from administrators, pushes security profiles and compliance policies to FortiClient agents on managed endpoints, evaluates device posture for ZTNA and VPN access decisions, and manages the full lifecycle of endpoint protection settings across the fleet. In most enterprise deployments the EMS server runs with privileged Windows service account credentials and maintains persistent HTTPS connectivity to every managed endpoint.

An attacker who achieves code execution on the EMS server does not merely compromise one machine — they inherit administrative authority over the endpoint security configuration of every device the EMS instance manages. This means the ability to disable quarantine policies, alter detection sensitivity settings, modify application control rules permitting previously-blocked tools, and push modified FortiClient agent configurations to endpoints across the organisation. Unlike the authentication bypass covered in yesterday's analysis of [CVE-2026-33032 (nginx-ui MCPwn)](/blog/nginx-ui-cve-2026-33032-mcpwn-authentication-bypass) — where a missing middleware registration on a single endpoint was the root cause — CVE-2026-35616 stems from improper access control logic within the API's request processing path, requiring targeted vendor remediation rather than a single-line configuration fix.

What we are observing is a zero-day exploitation pattern that started before the advisory was published. FortiClient EMS is an extremely high-value target — control the EMS, and you control the endpoint security posture of the entire organisation it manages.

Simo Kohonen, Defused Cyber — CVE-2026-35616 co-discoverer

Active Exploitation Timeline: Six Days Before Fortinet's Advisory Existed

The most significant threat-intelligence signal from CVE-2026-35616 is not the vulnerability itself — it is the exploitation timeline. Active attacks against FortiClient EMS deployments were first recorded on March 31, 2026, when watchTowr Labs registered hostile probing against its honeypot infrastructure. Fortinet did not publish its advisory (PSIRT FG-IR-26-099) until April 6. That six-day gap means attackers were operating against production targets while no patch existed, no public advisory existed, and defenders had no reason to suspect the attack vector.

Defused Cyber's Simo Kohonen confirmed on April 3 via a public post that zero-day exploitation had been observed earlier that week — prior to the watchTowr honeypot timestamp — suggesting the exploitation window may trace back further into the period immediately following responsible disclosure to Fortinet. CISA's April 6 simultaneous advisory and KEV addition with a three-day federal remediation deadline (April 9) reflects the confirmed exploitation status at the moment of disclosure: CISA does not add to KEV simultaneously with a vendor advisory without confirmed threat intelligence.

The Singapore CSA and NHS England Digital both issued national advisories this week, indicating the exploitation campaign has reached incident-confirmed cases in critical sectors across multiple jurisdictions. For organisations not subject to BOD 22-01, the federal deadline is a useful calibration: the US government judged eleven days was already too long to leave this unpatched. Non-federal organisations running FortiClient EMS 7.4.5 or 7.4.6 without the hotfix should treat remediation as an active incident response priority, not a scheduled maintenance item.

1

Identify internet-exposed FortiClient EMS instances

Scan for publicly accessible FortiClient EMS management interfaces on standard HTTPS ports. Confirm version as 7.4.5 or 7.4.6 via server headers or web interface fingerprinting. FortiClient EMS is commonly internet-accessible in organisations that allow remote IT administration without a VPN requirement.

2

Craft and send unauthenticated API requests

Exploit the improper access control flaw (CWE-284) by crafting API requests that bypass authentication checks. The requests are processed by the server as valid authenticated commands. No credentials, session tokens, or prior access required — the bypass is fully pre-authentication.

3

Achieve code execution with EMS service account privileges

Successfully crafted requests execute arbitrary code or commands with the privileges of the FortiClient EMS Windows service account. In default enterprise deployments, this account holds elevated local privileges and persistent HTTPS connectivity to all managed FortiClient endpoint agents.

4

Modify endpoint policies or pivot to managed endpoint fleet

From EMS code execution, attackers can modify FortiClient agent policies across all managed endpoints — disabling quarantine, altering detection rules, or pushing malicious configuration profiles. The EMS server's persistent agent connectivity provides a lateral movement surface to the entire endpoint fleet.

Who Is at Risk: FortiClient EMS Across Enterprise and Critical Infrastructure

FortiClient EMS is deployed by organisations that have standardised on FortiClient for enterprise endpoint protection — predominantly medium-to-large enterprises operating Fortinet's Security Fabric architecture. It is particularly prevalent in financial services, government, healthcare, critical infrastructure, and manufacturing, where Fortinet holds significant endpoint market share due to its integration with FortiGate next-generation firewalls and ZTNA access control.

NHS England Digital issued Cyber Alert CC-4766 explicitly naming CVE-2026-35616 and confirming active exploitation this week. The Cyber Security Agency of Singapore issued Alert AL-2026-031 with the same exploitation confirmation. Simultaneous national advisories from two government cybersecurity bodies — covering jurisdictions with significant critical infrastructure Fortinet deployments — indicate the campaign has produced confirmed incident cases beyond honeypot telemetry.

The vulnerability scope is version-specific: FortiClient EMS 7.4.5 and 7.4.6 are the affected releases. These represent the current-generation branch that organisations would have deployed during Q1 2026 standard upgrade cadence. Organisations on FortiClient EMS 7.2.x or earlier are reportedly not affected by CVE-2026-35616 specifically. However, given the rate of Fortinet vulnerability exploitation in recent quarters — CVE-2026-21643 was also added to CISA's KEV catalog in April 2026 alongside CVE-2026-35616 — a full Fortinet CVE exposure audit across all deployed versions remains advisable regardless of branch.

Rockstar Games Data Breach: 78.6 Million Records via Third-Party Snowflake Access

On April 14, 2026, Rockstar Games confirmed a breach after the ShinyHunters extortion group began publicly leaking internal data. The breach originated not in Rockstar's core infrastructure but through Anodot — a cloud cost-monitoring and anomaly detection service with authenticated integration access to Rockstar's Snowflake data warehouse environment.

ShinyHunters exploited a security flaw in Anodot's platform to extract service account authentication tokens. Those tokens were legitimate credentials Anodot used to perform its cost-monitoring functions — they granted real-time read access to Rockstar's connected Snowflake instance as a normal operational requirement of the integration. The attackers leveraged the stolen tokens to access Rockstar's Snowflake environment silently, exfiltrating data without triggering authentication alerts on Rockstar's side, since the access appeared to originate from a legitimate Anodot service account.

ShinyHunters demanded a ransom before going public. Rockstar declined. The group began publishing 78.6 million records on April 14. Independent analysis of the leaked dataset confirmed it consists primarily of internal analytics and operational metrics — not GTA 6 source code, player payment information, or personally identifiable information in sensitive categories. Rockstar's official statement confirmed the scope as limited to analytics data from Anodot-connected infrastructure.

The attack vector — compromising a third-party SaaS provider's credentials to silently pivot into a victim's cloud data warehouse — mirrors the supply chain exploitation pattern detailed in our post on [North Korea's 1,700 malicious packages targeting developer pipelines](/blog/north-korea-supply-chain-1700-packages). The entry point is not your infrastructure; it is the third-party service you trust with authenticated access to it.

ShinyHunters extracted authentication tokens from Anodot's environment that granted legitimate access to Rockstar's Snowflake instance. From Snowflake's perspective, the access pattern looked like normal Anodot service activity until exfiltration volume became anomalous.

Incident analysis — SecurityAffairs / CyberInsider, April 14, 2026

Operation PowerOFF, UAC-0247, and CISA's Windows Task Host Alert

Three additional developments from the week of April 14 warrant operational attention from security teams.

Operation PowerOFF concluded with Europol and law enforcement agencies across multiple countries seizing 53 domains belonging to commercial DDoS-for-hire platforms and arresting four individuals. The seized services collectively served over 75,000 registered users — providing on-demand volumetric denial-of-service capabilities targeting gaming platforms, financial institutions, and public services. The operation follows the 2024 takedown of RedLine and META infostealer infrastructure in Operation Magnus and reflects continued law enforcement escalation against crime-as-a-service business models that lower the technical barrier to cybercrime for non-specialist actors.

UAC-0247 is a newly disclosed threat cluster attributed by Ukraine's CERT-UA following campaigns between March and April 2026 targeting Ukrainian government bodies and municipal healthcare institutions — specifically clinics and emergency hospitals. The group deployed credential-theft malware designed to extract stored passwords from Chromium-based browsers and WhatsApp message histories from compromised endpoints. The deliberate targeting of emergency healthcare infrastructure during a conflict raises operational severity beyond data theft to potential disruption of medical services.

CISA flagged the Windows Task Host as harbouring an actively exploited privilege escalation vulnerability this week, adding it to the KEV catalog. This advisory coincides with the ongoing [April Patch Tuesday](/blog/patch-tuesday-april-2026) deployment cycle — organisations with outstanding Patch Tuesday items should accelerate deployment to address all confirmed exploitation cases in a single maintenance window this weekend.

Detection Guidance and IOCs: Hunting for CVE-2026-35616 Exploitation

Fortinet has not published formal indicator-of-compromise packages for CVE-2026-35616 as of April 17, 2026. Detection relies on behavioral monitoring, log analysis, and anomaly detection against the FortiClient EMS server and its connected endpoint fleet.

On the EMS server, review Windows Security Event logs and FortiClient EMS application logs for unexpected API activity since March 31. Specifically: API calls from IP addresses not corresponding to known FortiClient agent subnets or authorised administrator workstations; privileged operations executed without a corresponding authenticated session initiation; any new administrator account creation or modification of existing account privileges; and Windows service start/stop events outside of scheduled maintenance windows.

At the network layer, monitor outbound connections from the EMS server process. FortiClient EMS has a well-defined set of legitimate outbound destinations — FortiGuard update infrastructure, FortiClient agent subnets, and Fortinet licensing servers. Any outbound connection to external IPs outside these expected destinations, particularly on non-standard ports or exhibiting beacon-like timing patterns, warrants immediate investigation as a potential post-exploitation C2 indicator.

Downstream detection signal: if attackers modified FortiClient agent policy profiles after compromising the EMS server, managed endpoints will exhibit configuration drift from baseline — altered scan schedules, changed quarantine rules, modified application control policies. SIEM alerts on FortiClient agent configuration changes that do not correspond to known administrator actions provide a passive exploitation detection layer that operates even after the EMS server has been patched.

Indicators of Compromise
ArtifactTypeSHA-256 (Truncated)
FortiClient EMS API logs — unauthenticated request patternsLog Review TargetReview EMS API access logs from March 31 onward for privileged API calls from unauthenticated sources or IPs outside FortiClient agent subnets. Flag any privileged operation without a preceding authenticated session in the same log window.
New EMS administrator account creationBehavioral Indicator — Privilege EscalationAny administrator-level account created on FortiClient EMS outside documented change management since March 31, 2026. Verify against HR records and change tickets. Undocumented admin accounts are active compromise indicators.
Outbound EMS server connections to non-Fortinet IPsNetwork Indicator — Post-Exploitation C2Outbound connections from the FortiClient EMS server process to IPs outside FortiGuard and Fortinet licensing infrastructure. Flag connections on non-standard TCP ports or exhibiting regular beacon-interval timing patterns.
FortiClient agent policy configuration driftDownstream Detection SignalModifications to endpoint agent policy profiles — scan schedules, quarantine rules, application control settings — not initiated by known administrator accounts since March 31. Detectable via SIEM policy-change baseline alerting on FortiClient EMS.

Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.

Remediation Checklist: What to Patch and Audit Before Monday

This week's priority action list covers three distinct vectors: the actively exploited pre-auth RCE in FortiClient EMS, the third-party OAuth token exposure demonstrated by the Rockstar Games breach, and any outstanding April Patch Tuesday items that have not yet been deployed.

The FortiClient EMS hotfix is the single highest-priority action. CISA's federal deadline passed on April 9. Non-federal organisations have now had eleven days since the hotfix was published with no downtime required. An unpatched FortiClient EMS 7.4.5 or 7.4.6 server is a CISA-confirmed, actively-exploited, pre-authentication code execution vulnerability running on the system that manages your endpoint security infrastructure. Treat it as an active incident response priority, not a routine patch cycle item.

The Rockstar Games breach should prompt every organisation with third-party SaaS integrations connected to cloud data warehouses to conduct an immediate token permission audit. Identify which external services hold active OAuth tokens or API keys with read or write access to Snowflake, Databricks, or equivalent platforms. Verify expiry dates, rotation schedules, and revoke any access that is not actively required.

Apply Fortinet CVE-2026-35616 hotfix immediately

Log in to the Fortinet support portal and apply the out-of-band hotfix for FortiClient EMS 7.4.5 and 7.4.6. The fix applies without system downtime. After patching, review all EMS administrator accounts for unauthorised additions, rotate service account credentials, and review API logs since March 31. Monitor for FortiClient EMS 7.4.7 release for permanent fix deployment.

Restrict FortiClient EMS network access to VPN/private ranges only

FortiClient EMS management interfaces must not be accessible from the public internet. Apply firewall rules restricting EMS access to authorised administrator VPN ranges only. Any internet-facing FortiClient EMS instance on version 7.4.5 or 7.4.6 should be treated as potentially compromised pending full log review from March 31 onward.

Audit third-party SaaS OAuth tokens connected to cloud data warehouses

Inventory all third-party services with authenticated access to Snowflake, Databricks, Redshift, or equivalent cloud data platforms. Review token permissions against the least-privilege principle, check expiry dates and last-used timestamps, and revoke unused access. Rotate credentials for any integration where the third-party provider cannot confirm they have not been compromised in Q1 2026.

Verify April Patch Tuesday deployment completion

Confirm all April 14 Patch Tuesday critical items are deployed: CVE-2026-34621 (Adobe Acrobat Reader zero-day, CVSS 8.6), CVE-2026-32201 (SharePoint zero-day, CISA KEV), CVE-2026-33825 (BlueHammer Defender LPE with public PoC), CVE-2026-33824 (IKE wormable RCE, CVSS 9.8), and the newly flagged Windows Task Host privilege escalation. These remain active exploitation targets.

Deploy SIEM alerting on FortiClient agent policy baseline drift

Configure SIEM alerts on FortiClient agent policy profile changes not corresponding to known administrator actions. Changes to quarantine rules, scan schedules, or application control settings on managed endpoints are the downstream detection signal for a compromised EMS server and should trigger immediate escalation to incident response.

Enforce browser extension allowlisting across managed devices

Review installed extensions across managed enterprise devices against an approved allowlist. More than 100 malicious Chrome extensions targeting Google OAuth2 Bearer tokens are currently active in the Chrome Web Store. Remove unapproved extensions and enforce extension installation policy via browser management to prevent credential harvesting from administrative accounts.

The bottom line

CVE-2026-35616 is the patch this weekend. FortiClient EMS pre-auth RCE at CVSS 9.1, confirmed exploited since March 31, with national advisories from NHS England and Singapore CSA — and the permanent fix is still pending in 7.4.7. The hotfix is available today, applies without downtime, and protects the server that manages your entire endpoint security stack. The Rockstar Games breach adds a parallel action item: every organisation with third-party SaaS access to cloud data warehouses should audit external token permissions before Monday. One compromised Anodot credential was enough to reach 78.6 million Rockstar records. Your equivalent attack surface is the third-party permissions you have not reviewed. Apply the Fortinet hotfix. Audit third-party token access. Verify your April Patch Tuesday deployment is complete.

Frequently asked questions

What is CVE-2026-35616 in FortiClient EMS?

CVE-2026-35616 is a CVSS 9.1 improper access control vulnerability (CWE-284) in Fortinet FortiClient EMS versions 7.4.5 and 7.4.6. It allows an unauthenticated attacker to send specially crafted API requests that execute arbitrary code or commands on the EMS server. CISA added it to the Known Exploited Vulnerabilities catalog on April 6, 2026, after active exploitation was confirmed beginning March 31.

How does the FortiClient EMS pre-authentication API bypass work?

CVE-2026-35616 exploits improper access control logic in FortiClient EMS's API request handling path. An unauthenticated attacker sends crafted requests that the server processes without enforcing authentication checks, granting command execution with EMS service-level privileges. Because EMS manages endpoint security configurations across an entire enterprise, successful exploitation effectively hands an attacker administrative control over all managed FortiClient agents.

Which FortiClient EMS versions are affected by CVE-2026-35616?

CVE-2026-35616 affects FortiClient EMS 7.4.5 and 7.4.6. A permanent fix is expected in the upcoming 7.4.7 release, which has not been released as of April 17, 2026. Fortinet published an out-of-band hotfix for affected versions on April 6 that can be applied without downtime. Earlier FortiClient EMS versions in the 7.2.x branch are reportedly not affected by this specific flaw.

Has CISA added CVE-2026-35616 to the Known Exploited Vulnerabilities catalog?

Yes. CISA added CVE-2026-35616 to its KEV catalog on April 6, 2026 — simultaneously with Fortinet's advisory — reflecting confirmed active exploitation at the time of disclosure. Federal Civilian Executive Branch agencies under BOD 22-01 were required to remediate by April 9. The simultaneous advisory and KEV listing is one of the fastest CISA responses to a Fortinet vulnerability recorded in 2026.

How do I detect CVE-2026-35616 exploitation on my FortiClient EMS server?

Fortinet has not published formal IOCs. Detection requires behavioral monitoring: review API access logs for requests from unauthenticated or unknown sources, monitor for new admin account creation or privilege escalation events, and track outbound connections from the EMS server to unfamiliar external IPs. Any FortiClient agent policy changes not initiated by known administrators since March 31 should be investigated immediately.

What is the Fortinet hotfix for CVE-2026-35616 and how do I apply it?

Fortinet released an out-of-band hotfix for FortiClient EMS 7.4.5 and 7.4.6 on April 6, 2026, accessible via Fortinet's support portal. The hotfix applies without system downtime. A permanent fix ships in version 7.4.7, which has not yet been released as of April 17. Apply the available hotfix now — do not wait for 7.4.7. Federal agencies were required to complete patching by April 9.

How did ShinyHunters breach Rockstar Games and leak 78.6 million records?

ShinyHunters compromised Anodot, a third-party cloud cost-monitoring service integrated with Rockstar's Snowflake data warehouse. The attackers extracted authentication tokens from Anodot's environment and used them to silently access Rockstar's connected data warehouse. On April 14, 2026, after Rockstar declined a ransom demand, ShinyHunters published 78.6 million records — primarily internal analytics data rather than player payment information or game source code.

What are the most urgent patches for the week of April 14, 2026?

Four patches require immediate action: Fortinet CVE-2026-35616 (FortiClient EMS pre-auth RCE, CVSS 9.1 — apply hotfix now); CVE-2026-34621 (Adobe Acrobat zero-day exploited since November 2025); CVE-2026-32201 (Microsoft SharePoint zero-day, CISA KEV); and CVE-2026-33825 (BlueHammer Defender LPE with public exploit). All four are CISA KEV entries requiring action before end of weekend.

Sources & references

  1. The Hacker News — Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
  2. watchTowr — Fortinet FortiClient EMS Zero-Day: CVE-2026-35616 (Active Exploitation Underway)
  3. BleepingComputer — New FortiClient EMS flaw exploited in attacks, emergency patch released
  4. CISA KEV Catalog — CVE-2026-35616 (April 6, 2026)
  5. Fortinet PSIRT Advisory FG-IR-26-099
  6. Help Net Security — FortiClient EMS zero-day exploited, emergency hotfixes available
  7. SecurityAffairs — ShinyHunters claim the hack of Rockstar Games breach and started leaking data
  8. BleepingComputer — Stolen Rockstar Games analytics data leaked by extortion gang
  9. NHS England Digital Cyber Alert CC-4766 — CVE-2026-35616
  10. Integrity360 — Cyber News Roundup April 17, 2026
Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.