CVE-2026-34388

Fleet is open source device management software. Prior to 4.81.0, a denial-of-service vulnerability in Fleet's gRPC Launcher endpoint allows an authenticated host to crash the entire Fleet server process by sending an unexpected log type value. The server terminates immediately, disrupting all connected hosts, MDM enrollments, and API consumers. Version 4.81.0 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*

History

02 Apr 2026, 19:34

Type Values Removed Values Added
References () https://github.com/fleetdm/fleet/security/advisories/GHSA-w254-4hp5-7cvv - () https://github.com/fleetdm/fleet/security/advisories/GHSA-w254-4hp5-7cvv - Vendor Advisory
CPE cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Fleetdm fleet
Fleetdm

27 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 20:16

Updated : 2026-04-02 19:34


NVD link : CVE-2026-34388

Mitre link : CVE-2026-34388

CVE.ORG link : CVE-2026-34388


JSON object : View

Products Affected

fleetdm

  • fleet
CWE
CWE-703

Improper Check or Handling of Exceptional Conditions