CVE-2026-23518: CWE-347: Improper Verification of Cryptographic Signature in fleetdm fleet
CVE-2026-23518 is a critical vulnerability in Fleet open source device management software affecting versions prior to 4. 78. 3, 4. 77. 1, 4. 76. 2, 4. 75. 2, and 4. 53.
AI Analysis
Technical Summary
CVE-2026-23518 is a critical cryptographic signature verification vulnerability (CWE-347) in Fleet, an open source device management platform. The vulnerability affects multiple Fleet versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, specifically in the Windows Mobile Device Management (MDM) enrollment flow. Fleet uses JSON Web Tokens (JWTs) to authenticate device enrollment requests. However, due to improper verification of JWT signatures, Fleet accepts tokens with forged signatures, allowing attackers to impersonate arbitrary Azure Active Directory (Azure AD) user identities. This flaw bypasses authentication and authorization controls, enabling unauthorized devices to enroll in the managed environment. Such unauthorized enrollment can lead to device spoofing, unauthorized access to corporate resources, and potential lateral movement within the network. The vulnerability is exploitable remotely over the network without any privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects a critical severity with high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the flaw's nature makes it a prime target for attackers aiming to compromise enterprise device management. The issue is resolved in Fleet versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3. Until patched, disabling Windows MDM enrollment is recommended to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a severe risk to device management security, particularly for those leveraging Fleet integrated with Azure AD environments. Unauthorized device enrollment can lead to compromised endpoint security, allowing attackers to introduce rogue devices that appear legitimate. This can facilitate data exfiltration, unauthorized access to sensitive systems, and lateral movement within corporate networks. The breach of device identity integrity undermines trust in endpoint management, potentially disrupting compliance with GDPR and other regulations requiring strict device control and auditability. Critical sectors such as finance, healthcare, and government agencies in Europe, which rely heavily on secure device management and Azure AD, are especially vulnerable. The network-exploitable nature without authentication or user interaction increases the likelihood of widespread exploitation if unpatched. The impact extends beyond confidentiality to integrity and availability, as attackers could manipulate device enrollment to disrupt operations or implant persistent threats.
Mitigation Recommendations
European organizations should immediately upgrade Fleet to versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, or 4.53.3 to remediate the vulnerability. If upgrading is not immediately feasible, temporarily disable Windows MDM enrollment functionality to prevent exploitation. Conduct thorough audits of enrolled devices to detect any unauthorized enrollments that may have occurred prior to patching. Implement enhanced monitoring and alerting on device enrollment activities, focusing on anomalous Azure AD identity claims. Restrict network access to Fleet management interfaces to trusted IP ranges and enforce strong network segmentation. Review and tighten Azure AD conditional access policies to limit device enrollment scope. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving rogue device enrollment. Finally, maintain up-to-date inventory and asset management to quickly identify and isolate suspicious devices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2026-23518: CWE-347: Improper Verification of Cryptographic Signature in fleetdm fleet
Description
CVE-2026-23518 is a critical vulnerability in Fleet open source device management software affecting versions prior to 4. 78. 3, 4. 77. 1, 4. 76. 2, 4. 75. 2, and 4. 53.
AI-Powered Analysis
Technical Analysis
CVE-2026-23518 is a critical cryptographic signature verification vulnerability (CWE-347) in Fleet, an open source device management platform. The vulnerability affects multiple Fleet versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, specifically in the Windows Mobile Device Management (MDM) enrollment flow. Fleet uses JSON Web Tokens (JWTs) to authenticate device enrollment requests. However, due to improper verification of JWT signatures, Fleet accepts tokens with forged signatures, allowing attackers to impersonate arbitrary Azure Active Directory (Azure AD) user identities. This flaw bypasses authentication and authorization controls, enabling unauthorized devices to enroll in the managed environment. Such unauthorized enrollment can lead to device spoofing, unauthorized access to corporate resources, and potential lateral movement within the network. The vulnerability is exploitable remotely over the network without any privileges or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects a critical severity with high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the flaw's nature makes it a prime target for attackers aiming to compromise enterprise device management. The issue is resolved in Fleet versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3. Until patched, disabling Windows MDM enrollment is recommended to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a severe risk to device management security, particularly for those leveraging Fleet integrated with Azure AD environments. Unauthorized device enrollment can lead to compromised endpoint security, allowing attackers to introduce rogue devices that appear legitimate. This can facilitate data exfiltration, unauthorized access to sensitive systems, and lateral movement within corporate networks. The breach of device identity integrity undermines trust in endpoint management, potentially disrupting compliance with GDPR and other regulations requiring strict device control and auditability. Critical sectors such as finance, healthcare, and government agencies in Europe, which rely heavily on secure device management and Azure AD, are especially vulnerable. The network-exploitable nature without authentication or user interaction increases the likelihood of widespread exploitation if unpatched. The impact extends beyond confidentiality to integrity and availability, as attackers could manipulate device enrollment to disrupt operations or implant persistent threats.
Mitigation Recommendations
European organizations should immediately upgrade Fleet to versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, or 4.53.3 to remediate the vulnerability. If upgrading is not immediately feasible, temporarily disable Windows MDM enrollment functionality to prevent exploitation. Conduct thorough audits of enrolled devices to detect any unauthorized enrollments that may have occurred prior to patching. Implement enhanced monitoring and alerting on device enrollment activities, focusing on anomalous Azure AD identity claims. Restrict network access to Fleet management interfaces to trusted IP ranges and enforce strong network segmentation. Review and tighten Azure AD conditional access policies to limit device enrollment scope. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving rogue device enrollment. Finally, maintain up-to-date inventory and asset management to quickly identify and isolate suspicious devices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T18:22:43.980Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69714dc34623b1157cef80f1
Added to database: 1/21/2026, 10:05:55 PM
Last enriched: 1/21/2026, 10:20:32 PM
Last updated: 1/22/2026, 12:22:09 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23887: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Intermesh groupoffice
MediumCVE-2026-23873: CWE-1236: Improper Neutralization of Formula Elements in a CSV File in zhblue hustoj
MediumCVE-2026-1036: CWE-862 Missing Authorization in 10web Photo Gallery by 10Web – Mobile-Friendly Image Gallery
MediumCVE-2026-23737: CWE-502: Deserialization of Untrusted Data in lxsmnsyc seroval
HighCVE-2026-23736: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in lxsmnsyc seroval
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.