In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to:
This could allow unauthorized access to Fleet, including administrative access, visibility into device data, and modification of configuration.
This issue is addressed in commit fc96cc4 and is available in Fleet version 4.64.2.
The following backport versions also address this issue:
If an immediate upgrade is not possible, Fleet users should temporarily disable single-sign-on (SSO) and use password authentication.
Thank you @hakivvi, as well as Jeffrey Hofmann and Colby Morgan from the Robinhood Red Team for finding and reporting this vulnerability using our responsible disclosure process.
If you have any questions or comments about this advisory:
{ "nvd_published_at": "2025-03-06T19:15:27Z", "cwe_ids": [ "CWE-285", "CWE-74" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2025-03-06T19:12:27Z" }