Description
Fleet is an open source osquery manager. In Fleet before version 3.7.0 a malicious actor with a valid node key can send a badly formatted request that causes the Fleet server to exit, resulting in denial of service. This is possible only while a live query is currently ongoing. We believe the impact of this vulnerability to be low given the requirement that the actor has a valid node key. There is no information disclosure, privilege escalation, or code execution. The issue is fixed in Fleet 3.7.0.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/fleetdm/fleet/security/advisories/GHSA-xwh8-9p3f-3x45
Product, Third Party Advisory x_refsource_misc
https://www.npmjs.com/package/fleetctl
Patch, Third Party Advisory x_refsource_misc
https://github.com/fleetdm/fleet/commit/f68f4238e83b45b2164e4ed05df14af0f06eaf40
Scores
CVSS v3
2.7
EPSS
0.0068
EPSS Percentile
71.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
Details
CWE
CWE-400
Status
published
Products (1)
fleetdm/fleet
< 3.7.0
Published
Feb 10, 2021
Tracked Since
Feb 18, 2026