FortiClient EMS KEV Response
CISA added multiple FortiClient EMS issues to KEV in April 2026, including CVE-2026-21643 and CVE-2026-35616. Endpoint management systems are sensitive because they...
Management tools deserve edge-level urgency
CISA added multiple FortiClient EMS issues to KEV in April 2026, including CVE-2026-21643 and CVE-2026-35616. Endpoint management systems are sensitive because they sit near policy, software deployment, endpoint visibility, and administrative trust.
When a management tool enters KEV, treat it like an exposure review, not just a normal application patch.
Verify reachability
Start with reachability. Determine whether the EMS instance is internet-facing, reachable from broad internal networks, or restricted to an administrative segment. If the service is reachable from places that do not need it, reduce that access before doing anything else.
Then confirm who can authenticate, which accounts have administrative rights, and where logs are stored.
Patch and check for signs of misuse
Apply vendor guidance, then review authentication logs, administrative changes, device enrollment activity, policy changes, and unusual endpoint commands. A clean patch does not prove the system was not touched before the patch.
If logs are missing or too short-lived, document that as a visibility gap.
Reduce management blast radius
Long-term hardening should focus on segmentation, administrative MFA, role separation, log forwarding, backup validation, and change approval for endpoint policy updates. A management platform should not become a single quiet path into every endpoint.
Source note
This brief is based on CISA KEV entries for CVE-2026-21643 and CVE-2026-35616, with Fortinet references including FG-IR-25-1142 and FG-IR-26-099.
Keep Reading
All PostsActiveMQ KEV Message Broker Review
CISA added CVE-2026-34197 for Apache ActiveMQ to the KEV catalog on April 16, 2026. The catalog describes it as an improper input validation issue that can allow code...
After Physical Access Tests
Physical access testing can create temporary changes: opened rooms, moved equipment, test accounts, evidence files, device approvals, and security alerts. The work is...
Agentic Coding Tools Need Permission Design
Agentic coding tools ask for trust constantly: read this file, edit that module, run this command, install this package, open this URL. After enough prompts, humans...