Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26060: CWE-613: Insufficient Session Expiration in fleetdm fleet

0
Medium
VulnerabilityCVE-2026-26060cvecve-2026-26060cwe-613
Published: Fri Mar 27 2026 (03/27/2026, 18:22:43 UTC)
Source: CVE Database V5
Vendor/Project: fleetdm
Product: fleet

Description

Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user changes their password. As a result, a stale password reset token could be reused to reset the account password even after a defensive password change. Version 4.81.0 patches the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:00:57 UTC

Technical Analysis

CVE-2026-26060 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting Fleet, an open source device management platform widely used for endpoint management and security monitoring. Prior to version 4.81.0, Fleet's password management logic failed to invalidate previously issued password reset tokens after a user changed their password. This means that any stale password reset token remained valid and could be reused by an attacker to reset the account password, effectively bypassing the security benefit of a password change. The vulnerability requires an attacker to have access to a previously issued reset token and at least low-level privileges (authenticated user), but no user interaction is required. The flaw impacts the confidentiality and integrity of user accounts by allowing unauthorized password resets, potentially leading to account takeover. The CVSS 4.0 base score is 6.0 (medium severity), reflecting network attack vector, low attack complexity, partial impact on confidentiality and integrity, and no impact on availability. The issue was patched in Fleet version 4.81.0 by ensuring that password reset tokens are properly invalidated immediately after a password change, preventing reuse of stale tokens. No known exploits in the wild have been reported as of the publication date. Organizations relying on Fleet for device management should prioritize upgrading to the patched version to mitigate this risk.

Potential Impact

The vulnerability allows attackers who have obtained a previously issued password reset token to reset user account passwords even after the legitimate user has changed their password. This undermines the security of password reset mechanisms, potentially leading to unauthorized account access and privilege escalation within Fleet-managed environments. Such unauthorized access could allow attackers to manipulate device management operations, access sensitive endpoint data, or disrupt security monitoring processes. The impact is primarily on confidentiality and integrity, as attackers can gain control over user accounts and potentially the managed devices. The scope is limited to Fleet deployments running versions prior to 4.81.0. While no availability impact is noted, the breach of account security could lead to broader organizational risks, especially in environments where Fleet is integrated with critical infrastructure or sensitive data management. The medium severity rating reflects the need for authentication and possession of a reset token, which limits exploitation but does not eliminate risk, especially in environments with weak token protection or insider threats.

Mitigation Recommendations

1. Upgrade Fleet to version 4.81.0 or later immediately to ensure the vulnerability is patched. 2. Review and enhance password reset token management policies to ensure tokens are single-use and expire promptly after password changes. 3. Implement monitoring and alerting for unusual password reset activities or multiple reset attempts using the same token. 4. Enforce strict access controls and audit logging around password reset token issuance and usage to detect potential misuse. 5. Educate users and administrators on the importance of safeguarding password reset tokens and recognizing suspicious account activities. 6. Consider integrating multi-factor authentication (MFA) for account recovery processes to add an additional security layer. 7. Regularly audit Fleet deployments for outdated versions and enforce patch management policies to reduce exposure to known vulnerabilities. 8. If possible, invalidate all outstanding password reset tokens during emergency password changes or suspected compromise events.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-10T18:01:31.899Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6d01e3c064ed76fe28e08

Added to database: 3/27/2026, 6:44:46 PM

Last enriched: 3/27/2026, 7:00:57 PM

Last updated: 3/28/2026, 1:03:08 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses