Home Fleetdm CVE-2026-34387
Back to Fleetdm

CVE-2026-34387

Fleet - Software Installer Pipeline

Fleetdm CVSS 9.8 Updated April 8, 2026

Executive Risk Summary

"A command injection vulnerability in Fleet's software installer pipeline allows an attacker to achieve arbitrary code execution as root (macOS/Linux) or SYSTEM (Windows) on managed hosts when an uninstall is triggered for a crafted software package. This vulnerability is patched in version 4.81.1."

Anticipated Attack Path

  1. 1. An attacker crafts a malicious software package
  2. 2. The package is installed on a managed host
  3. 3. The package is uninstalled, triggering the command injection vulnerability

Am I Vulnerable?

  • Verify Fleet version is 4.81.1 or later
  • Review system logs for suspicious uninstall events
  • Monitor system for unusual network activity

Operational Audit Arsenal

Target Type Process
Target Asset fleet
Standard Path /usr/local/bin/fleet (Linux) or C:\Program Files\Fleet\fleet.exe (Windows)

Manual Verification Required

This is a non-Windows asset (Fleetdm). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Minimal, but may require restart of Fleet services

Internal Work Notes

Fleet software installer pipeline command injection vulnerability - upgrade to version 4.81.1 to prevent arbitrary code execution on managed hosts.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Fleetdm Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.