Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23999: CWE-330: Use of Insufficiently Random Values in fleetdm fleet

0
Low
VulnerabilityCVE-2026-23999cvecve-2026-23999cwe-330
Published: Thu Feb 26 2026 (02/26/2026, 02:45:48 UTC)
Source: CVE Database V5
Vendor/Project: fleetdm
Product: fleet

Description

Fleet is open source device management software. In versions prior to 4.80.1, Fleet generated device lock and wipe PINs using a predictable algorithm based solely on the current Unix timestamp. Because no secret key or additional entropy was used, the resulting PIN could potentially be derived if the approximate time the device was locked is known. Fleet’s device lock and wipe commands generate a 6-digit PIN that is displayed to administrators for unlocking a device. In affected versions, this PIN was deterministically derived from the current timestamp. An attacker with physical possession of a locked device and knowledge of the approximate time the lock command was issued could theoretically predict the correct PIN within a limited search window. However, successful exploitation is constrained by multiple factors: Physical access to the device is required, the approximate lock time must be known, the operating system enforces rate limiting on PIN entry attempts, attempts would need to be spread over, and device wipe operations would typically complete before sufficient attempts could be made. As a result, this issue does not allow remote exploitation, fleet-wide compromise, or bypass of Fleet authentication controls. Version 4.80.1 contains a patch. No known workarounds are available.

AI-Powered Analysis

AILast updated: 02/26/2026, 15:42:21 UTC

Technical Analysis

Fleet is an open source device management platform used to control and secure endpoints. In versions before 4.80.1, the device lock and wipe feature generates a 6-digit PIN to unlock devices. This PIN is deterministically derived from the current Unix timestamp without incorporating any secret key or additional entropy, resulting in insufficient randomness (CWE-330). Because the PIN generation algorithm is predictable, an attacker who gains physical possession of a locked device and knows approximately when the lock command was issued can attempt to guess the PIN by iterating over a limited range of timestamps. However, several factors constrain exploitation: physical access is mandatory, the operating system enforces rate limiting on PIN entry attempts, and the device wipe operation typically completes before enough attempts can be made to guess the PIN successfully. The vulnerability does not enable remote attacks, fleet-wide compromise, or bypass of Fleet’s authentication mechanisms. The issue was addressed in Fleet version 4.80.1 by improving the randomness of PIN generation. No known workarounds exist, and no exploits have been reported in the wild. The CVSS 4.0 vector indicates a low severity with partial attack complexity and attack requiring physical access but no privileges or user interaction.

Potential Impact

The primary impact of this vulnerability is the potential for an attacker with physical access to a locked device to bypass the lock by predicting the PIN used for unlocking or wiping the device. This could lead to unauthorized device access or premature device wipe, potentially resulting in data loss or device unavailability. However, the impact is limited due to the need for physical access, the requirement to know the approximate lock time, and the operating system’s rate limiting on PIN attempts. Organizations using Fleet for device management may face increased risk if devices are lost or stolen and the attacker is capable of exploiting this vulnerability before the device wipe completes. There is no risk of remote compromise or broader fleet-wide attacks, so the threat is localized to individual devices. The vulnerability could undermine trust in device lock mechanisms if exploited, but overall risk to organizational confidentiality, integrity, and availability is low.

Mitigation Recommendations

Organizations should upgrade Fleet to version 4.80.1 or later immediately to ensure the PIN generation uses sufficient entropy and is not predictable. Until upgraded, physical security controls should be strengthened to prevent unauthorized physical access to devices, especially those that may be locked remotely. Monitoring and alerting on device lock and wipe events can help detect suspicious activity. Rate limiting and lockout policies on devices should be reviewed and enforced to minimize brute force attempts. Additionally, organizations should consider implementing multi-factor authentication or additional device protection mechanisms beyond the Fleet PIN where possible. Regular audits of device management configurations and incident response plans for lost or stolen devices will further reduce risk. Since no workarounds exist, patching is the primary remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T18:49:20.658Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a06645b7ef31ef0b73ce20

Added to database: 2/26/2026, 3:27:01 PM

Last enriched: 2/26/2026, 3:42:21 PM

Last updated: 2/26/2026, 11:17:43 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses