CVE-2026-34391

Fleet is open source device management software. Prior to 4.81.1, a vulnerability in Fleet's Windows MDM command processing allows a malicious enrolled device to access MDM commands intended for other devices, potentially exposing sensitive configuration data such as WiFi credentials, VPN secrets, and certificate payloads across the entire Windows fleet. Version 4.81.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*

History

02 Apr 2026, 19:42

Type Values Removed Values Added
CPE cpe:2.3:a:fleetdm:fleet:*:*:*:*:*:*:*:*
First Time Fleetdm fleet
Fleetdm
References () https://github.com/fleetdm/fleet/security/advisories/GHSA-wg7j-pcc3-h4rh - () https://github.com/fleetdm/fleet/security/advisories/GHSA-wg7j-pcc3-h4rh - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

27 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 20:16

Updated : 2026-04-02 19:42


NVD link : CVE-2026-34391

Mitre link : CVE-2026-34391

CVE.ORG link : CVE-2026-34391


JSON object : View

Products Affected

fleetdm

  • fleet
CWE
CWE-488

Exposure of Data Element to Wrong Session