CVE-2026-23999: CWE-330: Use of Insufficiently Random Values in fleetdm fleet
Fleet is open source device management software. In versions prior to 4.80.1, Fleet generated device lock and wipe PINs using a predictable algorithm based solely on the current Unix timestamp. Because no secret key or additional entropy was used, the resulting PIN could potentially be derived if the approximate time the device was locked is known. Fleet’s device lock and wipe commands generate a 6-digit PIN that is displayed to administrators for unlocking a device. In affected versions, this PIN was deterministically derived from the current timestamp. An attacker with physical possession of a locked device and knowledge of the approximate time the lock command was issued could theoretically predict the correct PIN within a limited search window. However, successful exploitation is constrained by multiple factors: Physical access to the device is required, the approximate lock time must be known, the operating system enforces rate limiting on PIN entry attempts, attempts would need to be spread over, and device wipe operations would typically complete before sufficient attempts could be made. As a result, this issue does not allow remote exploitation, fleet-wide compromise, or bypass of Fleet authentication controls. Version 4.80.1 contains a patch. No known workarounds are available.
AI Analysis
Technical Summary
Fleet is an open source device management platform used to control and secure endpoints. In versions before 4.80.1, the device lock and wipe feature generates a 6-digit PIN to unlock devices. This PIN is deterministically derived from the current Unix timestamp without incorporating any secret key or additional entropy, resulting in insufficient randomness (CWE-330). Because the PIN generation algorithm is predictable, an attacker who gains physical possession of a locked device and knows approximately when the lock command was issued can attempt to guess the PIN by iterating over a limited range of timestamps. However, several factors constrain exploitation: physical access is mandatory, the operating system enforces rate limiting on PIN entry attempts, and the device wipe operation typically completes before enough attempts can be made to guess the PIN successfully. The vulnerability does not enable remote attacks, fleet-wide compromise, or bypass of Fleet’s authentication mechanisms. The issue was addressed in Fleet version 4.80.1 by improving the randomness of PIN generation. No known workarounds exist, and no exploits have been reported in the wild. The CVSS 4.0 vector indicates a low severity with partial attack complexity and attack requiring physical access but no privileges or user interaction.
Potential Impact
The primary impact of this vulnerability is the potential for an attacker with physical access to a locked device to bypass the lock by predicting the PIN used for unlocking or wiping the device. This could lead to unauthorized device access or premature device wipe, potentially resulting in data loss or device unavailability. However, the impact is limited due to the need for physical access, the requirement to know the approximate lock time, and the operating system’s rate limiting on PIN attempts. Organizations using Fleet for device management may face increased risk if devices are lost or stolen and the attacker is capable of exploiting this vulnerability before the device wipe completes. There is no risk of remote compromise or broader fleet-wide attacks, so the threat is localized to individual devices. The vulnerability could undermine trust in device lock mechanisms if exploited, but overall risk to organizational confidentiality, integrity, and availability is low.
Mitigation Recommendations
Organizations should upgrade Fleet to version 4.80.1 or later immediately to ensure the PIN generation uses sufficient entropy and is not predictable. Until upgraded, physical security controls should be strengthened to prevent unauthorized physical access to devices, especially those that may be locked remotely. Monitoring and alerting on device lock and wipe events can help detect suspicious activity. Rate limiting and lockout policies on devices should be reviewed and enforced to minimize brute force attempts. Additionally, organizations should consider implementing multi-factor authentication or additional device protection mechanisms beyond the Fleet PIN where possible. Regular audits of device management configurations and incident response plans for lost or stolen devices will further reduce risk. Since no workarounds exist, patching is the primary remediation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Netherlands, Sweden
CVE-2026-23999: CWE-330: Use of Insufficiently Random Values in fleetdm fleet
Description
Fleet is open source device management software. In versions prior to 4.80.1, Fleet generated device lock and wipe PINs using a predictable algorithm based solely on the current Unix timestamp. Because no secret key or additional entropy was used, the resulting PIN could potentially be derived if the approximate time the device was locked is known. Fleet’s device lock and wipe commands generate a 6-digit PIN that is displayed to administrators for unlocking a device. In affected versions, this PIN was deterministically derived from the current timestamp. An attacker with physical possession of a locked device and knowledge of the approximate time the lock command was issued could theoretically predict the correct PIN within a limited search window. However, successful exploitation is constrained by multiple factors: Physical access to the device is required, the approximate lock time must be known, the operating system enforces rate limiting on PIN entry attempts, attempts would need to be spread over, and device wipe operations would typically complete before sufficient attempts could be made. As a result, this issue does not allow remote exploitation, fleet-wide compromise, or bypass of Fleet authentication controls. Version 4.80.1 contains a patch. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
Fleet is an open source device management platform used to control and secure endpoints. In versions before 4.80.1, the device lock and wipe feature generates a 6-digit PIN to unlock devices. This PIN is deterministically derived from the current Unix timestamp without incorporating any secret key or additional entropy, resulting in insufficient randomness (CWE-330). Because the PIN generation algorithm is predictable, an attacker who gains physical possession of a locked device and knows approximately when the lock command was issued can attempt to guess the PIN by iterating over a limited range of timestamps. However, several factors constrain exploitation: physical access is mandatory, the operating system enforces rate limiting on PIN entry attempts, and the device wipe operation typically completes before enough attempts can be made to guess the PIN successfully. The vulnerability does not enable remote attacks, fleet-wide compromise, or bypass of Fleet’s authentication mechanisms. The issue was addressed in Fleet version 4.80.1 by improving the randomness of PIN generation. No known workarounds exist, and no exploits have been reported in the wild. The CVSS 4.0 vector indicates a low severity with partial attack complexity and attack requiring physical access but no privileges or user interaction.
Potential Impact
The primary impact of this vulnerability is the potential for an attacker with physical access to a locked device to bypass the lock by predicting the PIN used for unlocking or wiping the device. This could lead to unauthorized device access or premature device wipe, potentially resulting in data loss or device unavailability. However, the impact is limited due to the need for physical access, the requirement to know the approximate lock time, and the operating system’s rate limiting on PIN attempts. Organizations using Fleet for device management may face increased risk if devices are lost or stolen and the attacker is capable of exploiting this vulnerability before the device wipe completes. There is no risk of remote compromise or broader fleet-wide attacks, so the threat is localized to individual devices. The vulnerability could undermine trust in device lock mechanisms if exploited, but overall risk to organizational confidentiality, integrity, and availability is low.
Mitigation Recommendations
Organizations should upgrade Fleet to version 4.80.1 or later immediately to ensure the PIN generation uses sufficient entropy and is not predictable. Until upgraded, physical security controls should be strengthened to prevent unauthorized physical access to devices, especially those that may be locked remotely. Monitoring and alerting on device lock and wipe events can help detect suspicious activity. Rate limiting and lockout policies on devices should be reviewed and enforced to minimize brute force attempts. Additionally, organizations should consider implementing multi-factor authentication or additional device protection mechanisms beyond the Fleet PIN where possible. Regular audits of device management configurations and incident response plans for lost or stolen devices will further reduce risk. Since no workarounds exist, patching is the primary remediation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-19T18:49:20.658Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a06645b7ef31ef0b73ce20
Added to database: 2/26/2026, 3:27:01 PM
Last enriched: 2/26/2026, 3:42:21 PM
Last updated: 2/26/2026, 11:17:43 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.