CISO Security Intel

Interlock/The Gentlemen exploiting appliances (FortiClient EMS CISA KEV/JetBrains TeamCity/Cisco/MS DogWalk/BlueHammer/Chrome WebGPU/PHP CGI/Progress ShareFile/Next.js/Flowise/GoAnywhere/SmarterMail/Oracle/WebLogic/ServiceNow/F5/Wazuh/NK Axios/OpenClaw)

Interlock/The Gentlemen exploiting appliances (FortiClient EMS CISA KEV/JetBrains TeamCity/Cisco/MS DogWalk/BlueHammer/Chrome WebGPU/PHP CGI/Progress ShareFile/Next.js/Flowise/GoAnywhere/SmarterMail/Oracle/WebLogic/ServiceNow/F5/Wazuh/NK Axios/OpenClaw)

Key Questions

What is the main vulnerability in FortiClient EMS?

CVE-2026-35616 is a CVSS 9.8 pre-auth RCE in FortiClient EMS, under active exploitation with thousands of exposed systems. Fortinet issued an emergency hotfix as a full patch is pending.

What other Fortinet vulnerabilities are being exploited?

CVE-2023-48788 (SQLi, KEV since Apr 2022) and CVE-2026-21643 (SQLi active since Mar 2025) in FortiGate and related products have thousands exposed, including 2k+ in US/DE.

What is Progress ShareFile's vulnerability?

CVE-2026-2699 and CVE-2026-2701 are RCE flaws in Progress ShareFile, exploited by groups like Interlock and The Gentlemen. They enable unauthorized access in enterprise file sharing.

How is Chrome affected in these exploits?

Chrome's CVE-2026-5281 is a WebGPU UAF vulnerability added to CISA KEV, with over 146 exploits. It's targeted in appliance exploitation chains.

What zero-days is Storm-1175 using?

Storm-1175 exploits GoAnywhere CVE-2025-10035 and SmarterMail CVE-2026-23760 zero-days for rapid ransomware deployment. These chain into broader appliance attacks.

What is the TeamCity vulnerability status?

JetBrains TeamCity has an RCE flaw with 30k exposed instances. It's part of the appliance exploitation trend by Interlock and affiliates.

What other critical flaws are mentioned?

Dgraph has a CVSS 10 auth bypass; Flowise CVSS 10 RCE. These are weaponized in supply chain attacks alongside Oracle WebLogic, F5, and ServiceNow.

What mitigations are advised for these exploits?

Implement inventory management, patch configurations, IOC monitoring, whitelists, logs, NIDS, WAFs, and RBVM. Prioritize exposed appliances like FortiClient EMS.

FortiClient EMS CVE-2026-35616 (9.8 RCE auth bypass CISA KEV/hotfix 7.4.7/2k+ exposed/exploited Mar31) + CVE-2026-21643/-2023-48788 SQLi KEV; MS BlueHammer LPE; Progress ShareFile CVE-2026-2699/2701 RCE; Chrome CVE-2026-5281 KEV (146+); TeamCity RCE (30k); Storm-1175 GoAnywhere/SmarterMail/BeyondTrust/CrushFTP ZDs; supply chain OSS 97% high/crit. Inventory/patch configs/IOCs/whitelists/logs/NIDS/WAFs/SBOM/RBVM.

Sources (51)
Updated Apr 8, 2026
What is the main vulnerability in FortiClient EMS? - CISO Security Intel | NBot | nbot.ai