Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23517: CWE-862: Missing Authorization in fleetdm fleet

0
Medium
VulnerabilityCVE-2026-23517cvecve-2026-23517cwe-862
Published: Wed Jan 21 2026 (01/21/2026, 21:45:34 UTC)
Source: CVE Database V5
Vendor/Project: fleetdm
Product: fleet

Description

CVE-2026-23517 is a medium severity vulnerability in Fleet, an open-source device management software, affecting versions prior to 4. 78. 3, 4. 77. 1, 4. 76. 2, 4. 75. 2, and 4. 53.

AI-Powered Analysis

AILast updated: 01/21/2026, 22:20:45 UTC

Technical Analysis

CVE-2026-23517 is a broken access control vulnerability categorized under CWE-862, found in Fleet, an open-source device management platform. The issue exists in multiple versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, where the debug and pprof (profiling) endpoints are accessible to any authenticated user regardless of their assigned role. This includes the lowest-privilege 'Observer' role, which normally should have minimal access. Because these endpoints expose internal server diagnostics, runtime profiling data, and in-memory application state, unauthorized users can gain insights into server internals that should be restricted. Additionally, these endpoints allow triggering CPU-intensive profiling operations, which can degrade server performance or cause denial of service by exhausting resources. The vulnerability does not require elevated privileges beyond authentication and does not need user interaction, making it easier to exploit within an authenticated environment. The CVSS 4.0 score is 6.3 (medium severity), reflecting network attack vector, low attack complexity, no user interaction, and partial impact on confidentiality, integrity, and availability. No known exploits are reported in the wild yet. The recommended fix is to upgrade to patched versions or, if immediate upgrade is not feasible, to restrict access to these endpoints using IP allowlisting to prevent unauthorized access.

Potential Impact

For European organizations deploying Fleet for device management, this vulnerability poses risks of unauthorized information disclosure and potential denial of service. Low-privilege users or compromised accounts with minimal access could exploit the flaw to gather sensitive server diagnostics and profiling data, which may aid in further attacks or reconnaissance. The ability to trigger CPU-intensive profiling operations could degrade system performance or cause outages, impacting availability of device management services critical for operational continuity. This is particularly concerning for organizations managing large fleets of devices or those in regulated sectors where service availability and data confidentiality are paramount. While the vulnerability does not directly expose user data, the leakage of internal server state could facilitate lateral movement or privilege escalation attempts. The medium severity rating suggests a moderate but non-trivial threat level, warranting timely remediation to avoid exploitation.

Mitigation Recommendations

European organizations should immediately assess their Fleet deployments to identify affected versions. The primary mitigation is to upgrade Fleet to versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, or 4.53.3 or later, where the authorization checks on debug and pprof endpoints are properly enforced. If upgrading is not immediately possible, organizations should implement strict network-level controls by placing the debug and profiling endpoints behind an IP allowlist, restricting access only to trusted administrative networks or hosts. Additionally, monitoring authenticated user activity for unusual access patterns to these endpoints can provide early detection of exploitation attempts. Organizations should also review user roles and minimize the number of users with authenticated access, especially those with observer or low-privilege roles, to reduce the attack surface. Regular audits of Fleet configurations and logs will help ensure compliance with security policies and detect any misuse of diagnostic endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.979Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69714dc34623b1157cef80ed

Added to database: 1/21/2026, 10:05:55 PM

Last enriched: 1/21/2026, 10:20:45 PM

Last updated: 1/22/2026, 12:16:00 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats