GHSA-2rc4-7jc6-qffh

Suggest an improvement
Source
https://github.com/advisories/GHSA-2rc4-7jc6-qffh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-2rc4-7jc6-qffh/GHSA-2rc4-7jc6-qffh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2rc4-7jc6-qffh
Aliases
  • CVE-2026-23998
Published
2026-05-14T13:13:11Z
Modified
2026-05-14T13:33:59.386258Z
Severity
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Fleet has a Windows MDM management endpoint authentication bypass
Details

Summary

A vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, this could allow an attacker to impersonate an enrolled Windows device and retrieve sensitive configuration data.

Impact

Fleet’s Windows MDM management endpoint relies on mutual TLS (mTLS) client certificates to authenticate enrolled devices. In affected versions, requests that did not present a client certificate could be incorrectly treated as trusted.

As a result, an attacker with prior knowledge of a valid enrolled device identifier could potentially impersonate that device and receive configuration payloads intended for it. These payloads may contain sensitive information such as Wi-Fi or VPN configuration data, certificates, or other secrets delivered through MDM profiles.

This issue does not allow enrollment of new devices, administrative access to Fleet, or compromise of the Fleet control plane. Impact is limited to the targeted Windows device.

Workarounds

If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.

For more information

If you have any questions or comments about this advisory:

Email us at security@fleetdm.com Join #fleet in osquery Slack

Credits

We thank @secfox-ai for responsibly reporting this issue.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-14T13:13:11Z",
    "cwe_ids": [
        "CWE-295"
    ],
    "severity": "HIGH",
    "nvd_published_at": null
}
References

Affected packages

Go / github.com/fleetdm/fleet/v4

Package

Name
github.com/fleetdm/fleet/v4
View open source insights on deps.dev
Purl
pkg:golang/github.com/fleetdm/fleet/v4

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.81.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-2rc4-7jc6-qffh/GHSA-2rc4-7jc6-qffh.json"