CVE-2026-27806
HIGHFleet Affected by Local Privilege Escalation via Tcl Command Injection in Orbit
Title source: cnaDescription
Fleet is open source device management software. Prior to 4.81.1, the Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via exec.Command("expect", "-c", script). Because the password is inserted into Tcl brace-quoted send {%s}, a password containing } terminates the literal and injects arbitrary Tcl commands. Since Orbit runs as root, this allows a local unprivileged user to escalate to root privileges. This vulnerability is fixed in 4.81.1.
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
2.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (2)
fleetdm/fleet
< 4.81.1 (2 CPE variants)
fleetdm/fleet
0 - 4.81.1Go
Published
Apr 08, 2026
Tracked Since
Apr 09, 2026