Skip to content

CTI Submission: https://bishopfox.com/blog/api-authentication-bypa... #257

@letswastetimee

Description

@letswastetimee

CTI Content

Content successfully downloaded and saved to file.

Content Preview:

CVE-2026-35616 is an authentication bypass inFortiClient EMS 7.4.5 and 7.4.6.The Django authentication middleware accepts client certificate information from both trusted WSGI environment variables (set by Apachemod_ssl) and user-controllable HTTP request headers, and Apache was never configured to strip the user-controllable variants. An attacker who can reach the EMS web interface over HTTPS needs no credentials to exploit this. Additionally, the certificate chain validation performs only Dist...

Full content length: 14,114 characters
Saved to: .hearth/intel-drops/issue-257-cti.txt

The full content has been downloaded and will be processed automatically.

Link to Original Source

https://bishopfox.com/blog/api-authentication-bypass-in-forticlient-ems-7-4-5-7-4-6-cve-2026-35616

Your Name / Handle

smossmos

Link to Profile (Optional)

https://github.com/smossmos

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions