Home Fleetdm CVE-2026-34391
Back to Fleetdm

CVE-2026-34391

Fleet - Device Management

Fleetdm CVSS 7.5 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in Fleet's Windows MDM command processing allows malicious enrolled devices to access sensitive configuration data. This issue is patched in version 4.81.1."

Anticipated Attack Path

  1. 1. A malicious device enrolls in the Fleet device management system
  2. 2. The malicious device exploits the vulnerability to access MDM commands intended for other devices
  3. 3. Sensitive configuration data is exposed, potentially leading to further attacks

Am I Vulnerable?

  • Is your Fleet version prior to 4.81.1?
  • Are Windows devices enrolled in your Fleet device management system?
  • Have you applied the patch for this vulnerability?

Operational Audit Arsenal

Target Type Software
Target Asset Fleet Device Management
Standard Path Management Plane / MDM Command Processing

Manual Verification Required

This is a non-Windows asset (Fleetdm). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only affects the MDM command processing

Internal Work Notes

CVE-2026-34391: Fleet Device Management vulnerability allowing malicious devices to access sensitive data, patched in version 4.81.1

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Fleetdm Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.