CVE-2026-27806

HIGH

Fleet Affected by Local Privilege Escalation via Tcl Command Injection in Orbit

Title source: cna
STIX 2.1

Description

Fleet is open source device management software. Prior to 4.81.1, the Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via exec.Command("expect", "-c", script). Because the password is inserted into Tcl brace-quoted send {%s}, a password containing } terminates the literal and injects arbitrary Tcl commands. Since Orbit runs as root, this allows a local unprivileged user to escalate to root privileges. This vulnerability is fixed in 4.81.1.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (2)
fleetdm/fleet < 4.81.1 (2 CPE variants)
fleetdm/fleet 0 - 4.81.1Go
Published Apr 08, 2026
Tracked Since Apr 09, 2026