CVE-2026-23518

CRITICAL

Fleet <4.78.3-4.53.3 - Auth Bypass

Title source: llm
STIX 2.1

Description

Fleet is open source device management software. In versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, a vulnerability in Fleet's Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not properly validated. Because JWT signatures were not verified, Fleet could accept attacker-controlled identity claims, enabling enrollment of unauthorized devices under arbitrary Azure AD user identities. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.

Scores

CVSS v3 9.8
EPSS 0.0005
EPSS Percentile 15.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-347
Status published
Products (3)
fleetdm/fleet 4.77.0
fleetdm/fleet < 4.53.3
fleetdm/fleet 4.78.0 - 4.78.3Go
Published Jan 21, 2026
Tracked Since Feb 18, 2026