CVE-2026-22808

5.4 MEDIUM

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in Fleet device management software that allows unauthenticated attackers to steal administrator authentication tokens when Windows MDM is enabled. The stolen tokens can grant unauthorized administrative access to Fleet, potentially compromising device data and configuration. Organizations using affected Fleet versions with Windows MDM enabled are at risk.

💻 Affected Systems

Products:
  • fleetdm/fleet
Versions: All versions prior to 4.78.2, 4.77.1, 4.76.2, 4.75.2, and 4.53.3
Operating Systems: Windows (when MDM is enabled)
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Windows MDM feature is enabled. Other configurations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Fleet instance with administrative privileges, allowing attacker to view all device data, modify configurations, deploy malicious software to managed devices, and maintain persistent access.

🟠

Likely Case

Unauthorized access to Fleet administrative interface, enabling attacker to view sensitive device information and potentially modify configurations affecting managed endpoints.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though stolen credentials could still be used if attacker gains access to internal network.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires Windows MDM to be enabled and involves XSS payload delivery to steal localStorage authentication tokens.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.78.2, 4.77.1, 4.76.2, 4.75.2, or 4.53.3

Vendor Advisory: https://github.com/fleetdm/fleet/security/advisories/GHSA-gfpw-jgvr-cw4j

Restart Required: Yes

Instructions:

1. Backup Fleet configuration and data. 2. Upgrade to one of the patched versions: 4.78.2, 4.77.1, 4.76.2, 4.75.2, or 4.53.3. 3. Restart Fleet services. 4. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Disable Windows MDM

all

Temporarily disable Windows Mobile Device Management feature in Fleet configuration

Edit Fleet configuration file to set 'mdm.enabled_windows' to false
Restart Fleet services after configuration change

🧯 If You Can't Patch

  • Immediately disable Windows MDM feature in Fleet configuration
  • Implement network segmentation to isolate Fleet instance from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if Fleet version is below patched versions AND Windows MDM is enabled in configuration

Check Version:

fleetctl version

Verify Fix Applied:

Verify Fleet version is 4.78.2, 4.77.1, 4.76.2, 4.75.2, or 4.53.3 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed login attempts followed by successful admin access
  • Configuration changes from unexpected sources

Network Indicators:

  • Unexpected outbound connections from Fleet server
  • Suspicious HTTP requests to Fleet endpoints

SIEM Query:

source="fleet" AND (event="authentication" AND result="success" AND user="admin" AND src_ip NOT IN [trusted_ips])

🔗 References

📤 Share & Export