<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FleetDM — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/fleetdm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 13:18:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/fleetdm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Fleet Server gRPC PublishLogs Endpoint Denial-of-Service Vulnerability (CVE-2026-26062)</title><link>https://feed.craftedsignal.io/briefs/2026-05-fleet-grpc-dos/</link><pubDate>Thu, 14 May 2026 13:18:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-fleet-grpc-dos/</guid><description>Fleet server versions prior to 4.81.0 are vulnerable to a denial-of-service (DoS) via the gRPC Launcher `PublishLogs` endpoint, where unexpected input values can cause the server process to terminate upon receiving a crafted request from an authenticated Launcher host.</description><content:encoded><![CDATA[<p>Fleet server versions before 4.81.0 contain a denial-of-service vulnerability affecting the gRPC Launcher&rsquo;s <code>PublishLogs</code> endpoint. This flaw allows an authenticated attacker, possessing a valid Launcher node key, to send a specially crafted gRPC request that the Fleet server fails to handle gracefully. The unexpected input within this request triggers a condition leading to the immediate termination of the Fleet server process, causing a complete denial of service. The vulnerability, assigned CVE-2026-26062, stems from inadequate input validation on the <code>PublishLogs</code> endpoint. Successful exploitation requires a valid Launcher node key, limiting the attack surface to compromised or malicious Launcher hosts enrolled within the Fleet management infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to a valid Launcher node key, either through compromise of a Launcher host or insider threat.</li>
<li>Attacker crafts a malicious gRPC request specifically targeting the <code>PublishLogs</code> endpoint of the Fleet server.</li>
<li>The malicious gRPC request contains unexpected or malformed input designed to trigger the vulnerability.</li>
<li>Attacker authenticates to the Fleet server using the compromised Launcher node key.</li>
<li>Attacker sends the crafted gRPC request to the <code>PublishLogs</code> endpoint.</li>
<li>The Fleet server receives the malicious request and attempts to process the malformed input.</li>
<li>Due to inadequate input validation, the server encounters an unhandled exception or error condition.</li>
<li>The unhandled exception causes the Fleet server process to terminate unexpectedly, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in an immediate and complete denial of service, impacting the availability of Fleet server. This could disrupt endpoint monitoring, policy enforcement, and other critical security functions dependent on the Fleet platform. Although there is no exposure of sensitive data, authentication bypass, privilege escalation, or integrity impact, the disruption to operations can be significant, especially in environments relying heavily on Fleet for endpoint management and security visibility. The number of affected organizations depends on the prevalence of Fleet deployments and the attacker&rsquo;s ability to compromise Launcher node keys.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fleet server to version 4.81.0 or later to remediate the vulnerability (CVE-2026-26062).</li>
<li>Restrict network access to the Fleet gRPC endpoint (where feasible) to limit potential attack surfaces, as described in the advisory.</li>
<li>Deploy Fleet behind infrastructure that terminates or filters gRPC traffic if Launcher log ingestion is not required, mitigating the impact of malicious requests.</li>
<li>Monitor for repeated Fleet process crashes or unexpected restarts, indicating potential exploitation attempts, as suggested in the advisory.</li>
<li>Implement the Sigma rule &ldquo;Detect Fleet Server Crashes&rdquo; to identify potential exploitation attempts based on server crash events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>denial-of-service</category><category>grpc</category><category>fleet</category><category>github advisory</category></item><item><title>Fleet Windows MDM Management Endpoint Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-fleet-mdm-bypass/</link><pubDate>Thu, 14 May 2026 13:15:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-fleet-mdm-bypass/</guid><description>CVE-2026-23998 describes a vulnerability in Fleet's Windows MDM management endpoint that allows requests to be processed without proper client certificate validation, potentially allowing an attacker to impersonate a device and retrieve sensitive configuration data.</description><content:encoded><![CDATA[<p>Fleet&rsquo;s Windows MDM management endpoint is vulnerable to an authentication bypass (CVE-2026-23998) due to improper client certificate validation. Specifically, requests to the MDM endpoint could be processed even without a valid client certificate. An attacker with prior knowledge of a valid enrolled device identifier could exploit this vulnerability to impersonate that device. Successful exploitation could allow the attacker to receive sensitive configuration payloads intended for the targeted device. This vulnerability affects Fleet versions prior to 4.81.0. It&rsquo;s important for defenders to identify and mitigate this risk to protect sensitive device configurations and data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target Windows device enrolled in Fleet MDM and obtains its device identifier.</li>
<li>Attacker crafts a malicious HTTP request to the Fleet Windows MDM management endpoint.</li>
<li>The malicious request is sent without a valid client certificate.</li>
<li>Due to the vulnerability, the Fleet server incorrectly processes the request as if it were authenticated.</li>
<li>The Fleet server retrieves the configuration payload associated with the target device identifier.</li>
<li>The configuration payload, potentially containing sensitive information (Wi-Fi passwords, VPN configurations, certificates), is sent to the attacker.</li>
<li>Attacker gains unauthorized access to sensitive configuration data of the targeted Windows device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23998 allows an attacker to retrieve sensitive configuration data intended for a specific Windows device managed by Fleet MDM. This could include Wi-Fi passwords, VPN configurations, certificates, and other secrets delivered through MDM profiles. The vulnerability does not allow the attacker to enroll new devices, gain administrative access to Fleet, or compromise the Fleet control plane. The impact is limited to the targeted Windows device, but exfiltration of sensitive information from that device could lead to broader network compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fleet to version 4.81.0 or later to patch CVE-2026-23998 (reference: Affected Packages).</li>
<li>If an immediate upgrade is not possible, temporarily disable Windows MDM (reference: Workarounds).</li>
<li>Monitor webserver logs for requests to the MDM endpoint lacking client certificates, using the provided Sigma rules (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>authentication-bypass</category><category>credential-access</category><category>mdm</category></item><item><title>Fleet Windows MDM Azure AD JWT Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-fleet-jwt-bypass/</link><pubDate>Thu, 14 May 2026 13:15:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-fleet-jwt-bypass/</guid><description>A vulnerability in Fleet versions prior to 4.82.0 allows authentication tokens from any Azure AD tenant to be accepted, enabling unauthorized device enrollment and MDM API access due to improper JWT signature validation, tracked as CVE-2026-24899.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in Fleet versions prior to 4.82.0, specifically affecting the Windows MDM enrollment flow. This flaw stems from insufficient validation of JWT signatures during the Azure AD authentication process. Fleet&rsquo;s implementation utilizes Microsoft&rsquo;s multi-tenant JWKS endpoint for signature verification but neglects to enforce the <code>aud</code> (audience) and <code>iss</code> (issuer) claims within the JWT. This oversight permits the acceptance of authentication tokens originating from any Azure AD tenant, as long as they are signed by Microsoft and contain the expected scopes. Successful exploitation allows attackers to bypass intended authorization controls, enabling them to enroll unauthorized devices and interact with Fleet&rsquo;s MDM management APIs, potentially exposing enrollment secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to any Azure AD tenant, potentially through compromised credentials or a rogue application registration.</li>
<li>The attacker requests an Azure AD access token with the necessary scopes for Fleet MDM enrollment.</li>
<li>The attacker initiates the Windows MDM enrollment process, presenting the crafted Azure AD access token to the Fleet MDM endpoint.</li>
<li>Fleet validates the JWT signature against Microsoft&rsquo;s JWKS endpoint but skips validation of the <code>aud</code> and <code>iss</code> claims.</li>
<li>The unauthorized access token is accepted by Fleet, granting the attacker the ability to enroll a device under a different Azure AD tenant.</li>
<li>The attacker leverages enrolled devices to interact with Fleet&rsquo;s MDM management APIs.</li>
<li>Sensitive enrollment secrets embedded in MDM command payloads are exposed to the attacker.</li>
<li>The attacker uses exposed secrets for further unauthorized access or lateral movement within the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24899 can lead to unauthorized device enrollment, potentially giving attackers control over managed Windows systems. Fleet may expose sensitive enrollment secrets, facilitating further unauthorized access. This vulnerability has the potential to affect any organization using Fleet with Windows MDM enabled, leading to data breaches and compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Fleet to version 4.82.0 or later to address the vulnerability (reference: Affected Packages).</li>
<li>As an immediate workaround, disable Windows MDM in Fleet if an upgrade is not possible (reference: Workarounds).</li>
<li>Monitor Fleet logs for suspicious device enrollment activities originating from unexpected Azure AD tenants (requires specific logging not detailed in source).</li>
<li>Investigate any unauthorized device enrollments identified within the Fleet management console (requires manual review).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>jwt</category><category>azuread</category><category>authentication</category><category>bypass</category><category>mdm</category><category>fleetdm</category></item></channel></rss>