Skip to content
Back to Blog
Threat Brief

FortiClient EMS KEV Response

CISA added multiple FortiClient EMS issues to KEV in April 2026, including CVE-2026-21643 and CVE-2026-35616. Endpoint management systems are sensitive because they...

FortiClient EMS KEV Response - ZeroTrace blog image
April 20, 20262 min read223 words
Threat BriefThreat BriefFortiClientEMSKEV

Management tools deserve edge-level urgency

CISA added multiple FortiClient EMS issues to KEV in April 2026, including CVE-2026-21643 and CVE-2026-35616. Endpoint management systems are sensitive because they sit near policy, software deployment, endpoint visibility, and administrative trust.

When a management tool enters KEV, treat it like an exposure review, not just a normal application patch.

Verify reachability

Start with reachability. Determine whether the EMS instance is internet-facing, reachable from broad internal networks, or restricted to an administrative segment. If the service is reachable from places that do not need it, reduce that access before doing anything else.

Then confirm who can authenticate, which accounts have administrative rights, and where logs are stored.

Patch and check for signs of misuse

Apply vendor guidance, then review authentication logs, administrative changes, device enrollment activity, policy changes, and unusual endpoint commands. A clean patch does not prove the system was not touched before the patch.

If logs are missing or too short-lived, document that as a visibility gap.

Reduce management blast radius

Long-term hardening should focus on segmentation, administrative MFA, role separation, log forwarding, backup validation, and change approval for endpoint policy updates. A management platform should not become a single quiet path into every endpoint.

Source note

This brief is based on CISA KEV entries for CVE-2026-21643 and CVE-2026-35616, with Fortinet references including FG-IR-25-1142 and FG-IR-26-099.

Command Palette

Search for a command to run...