🔐 CVE Alert

CVE-2026-23998

UNKNOWN 0.0

Fleet has a Windows MDM management endpoint authentication bypass

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, this could allow an attacker to impersonate an enrolled Windows device and retrieve sensitive configuration data. Fleet’s Windows MDM management endpoint relies on mutual TLS (mTLS) client certificates to authenticate enrolled devices. In affected versions, requests that did not present a client certificate could be incorrectly treated as trusted. As a result, an attacker with prior knowledge of a valid enrolled device identifier could potentially impersonate that device and receive configuration payloads intended for it. These payloads may contain sensitive information such as Wi-Fi or VPN configuration data, certificates, or other secrets delivered through MDM profiles. This issue does not allow enrollment of new devices, administrative access to Fleet, or compromise of the Fleet control plane. Impact is limited to the targeted Windows device. Version 4.81.0 contains a patch. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.

CWE CWE-295
Vendor fleetdm
Product fleet
Published May 14, 2026
Stay Ahead of the Next One

Get instant alerts for fleetdm fleet

Be the first to know when new unknown vulnerabilities affecting fleetdm fleet are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

fleetdm / fleet
< 4.81.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/fleetdm/fleet/security/advisories/GHSA-2rc4-7jc6-qffh github.com: https://github.com/fleetdm/fleet/releases/tag/fleet-v4.81.0