Fleet is open source device management software. Prior to 4.81.1, a vulnerability in Fleet's Windows MDM command processing allows a malicious enrolled device to access MDM commands intended for other devices, potentially exposing sensitive configuration data such as WiFi credentials, VPN secrets, and certificate payloads across the entire Windows fleet. Version 4.81.1 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/fleetdm/fleet/security/advisories/GHSA-wg7j-pcc3-h4rh | Vendor Advisory |
Configurations
History
02 Apr 2026, 19:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:* | |
| First Time |
Fleetdm fleet
Fleetdm |
|
| References | () https://github.com/fleetdm/fleet/security/advisories/GHSA-wg7j-pcc3-h4rh - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
27 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 20:16
Updated : 2026-04-02 19:42
NVD link : CVE-2026-34391
Mitre link : CVE-2026-34391
CVE.ORG link : CVE-2026-34391
JSON object : View
Products Affected
fleetdm
- fleet
CWE
CWE-488
Exposure of Data Element to Wrong Session
