CVE-2026-23518

Fleet is open source device management software. In versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, a vulnerability in Fleet's Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not properly validated. Because JWT signatures were not verified, Fleet could accept attacker-controlled identity claims, enabling enrollment of unauthorized devices under arbitrary Azure AD user identities. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
cpe:2.3:a:fleetdm:fleet:4.77.0:*:*:*:*:*:*:*

History

27 Feb 2026, 16:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/fleetdm/fleet/commit/e225ef57912c8f4ac8977e24b5ebe1d9fd875257 - () https://github.com/fleetdm/fleet/commit/e225ef57912c8f4ac8977e24b5ebe1d9fd875257 - Patch
References () https://github.com/fleetdm/fleet/security/advisories/GHSA-63m5-974w-448v - () https://github.com/fleetdm/fleet/security/advisories/GHSA-63m5-974w-448v - Vendor Advisory
CPE cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
cpe:2.3:a:fleetdm:fleet:4.77.0:*:*:*:*:*:*:*
First Time Fleetdm fleet
Fleetdm

21 Jan 2026, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-21 22:15

Updated : 2026-02-27 16:14


NVD link : CVE-2026-23518

Mitre link : CVE-2026-23518

CVE.ORG link : CVE-2026-23518


JSON object : View

Products Affected

fleetdm

  • fleet
CWE
CWE-347

Improper Verification of Cryptographic Signature