CVE-2026-23517

8.1 HIGH

📋 TL;DR

Fleet device management software versions before 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 have broken access control that allows any authenticated user, including low-privilege Observer roles, to access debug/profiling endpoints. This exposes internal server diagnostics and allows triggering resource-intensive operations that could cause denial of service.

💻 Affected Systems

Products:
  • Fleet
Versions: Versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Fleet deployments with default configuration where debug endpoints are enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Low-privilege authenticated users can access sensitive server internals, view runtime profiling data and in-memory application state, and trigger CPU-intensive profiling operations leading to denial of service.

🟠

Likely Case

Internal users with basic authentication can access debug endpoints to view server diagnostics and potentially degrade performance through profiling operations.

🟢

If Mitigated

Only authorized administrators can access debug endpoints for legitimate troubleshooting purposes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid authentication but minimal technical skill - just accessing known debug endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.78.3, 4.77.1, 4.76.2, 4.75.2, or 4.53.3

Vendor Advisory: https://github.com/fleetdm/fleet/security/advisories/GHSA-4r5r-ccr6-q6f6

Restart Required: Yes

Instructions:

1. Backup your Fleet configuration and database. 2. Stop Fleet service. 3. Upgrade to patched version using your deployment method (Docker, package manager, etc.). 4. Restart Fleet service. 5. Verify version and endpoint access controls.

🔧 Temporary Workarounds

IP Allowlist for Debug Endpoints

all

Restrict access to debug/pprof endpoints to specific IP addresses using network controls or web server configuration.

# Example nginx configuration:
location /debug/pprof {
    allow 10.0.0.0/8;
    allow 192.168.0.0/16;
    deny all;
}

🧯 If You Can't Patch

  • Disable debug endpoints entirely in Fleet configuration if not needed for troubleshooting.
  • Implement strict network segmentation to isolate Fleet management interface from regular user networks.

🔍 How to Verify

Check if Vulnerable:

Check if authenticated low-privilege user can access /debug/pprof endpoints or verify Fleet version is vulnerable.

Check Version:

fleetctl version or check Fleet web interface version display

Verify Fix Applied:

Confirm low-privilege users cannot access /debug/pprof endpoints and verify running patched version.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /debug/pprof endpoints
  • High CPU usage from profiling operations
  • Authentication logs showing Observer role users accessing debug paths

Network Indicators:

  • HTTP requests to /debug/pprof/* from non-admin IP addresses
  • Unusual traffic patterns to debug endpoints

SIEM Query:

source="fleet" AND (uri_path="/debug/pprof" OR uri_path="/debug/pprof/*") AND user_role!="admin"

🔗 References

📤 Share & Export