Логотип exploitDog
bind:CVE-2026-23518
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23518

Количество 2

Количество 2

nvd логотип

CVE-2026-23518

18 дней назад

Fleet is open source device management software. In versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, a vulnerability in Fleet's Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not properly validated. Because JWT signatures were not verified, Fleet could accept attacker-controlled identity claims, enabling enrollment of unauthorized devices under arbitrary Azure AD user identities. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.

EPSS: Низкий
github логотип

GHSA-63m5-974w-448v

20 дней назад

Fleet has a JWT signature bypass vulnerability in Azure AD MDM enrollment

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-23518

Fleet is open source device management software. In versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, a vulnerability in Fleet's Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not properly validated. Because JWT signatures were not verified, Fleet could accept attacker-controlled identity claims, enabling enrollment of unauthorized devices under arbitrary Azure AD user identities. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.

0%
Низкий
18 дней назад
github логотип
GHSA-63m5-974w-448v

Fleet has a JWT signature bypass vulnerability in Azure AD MDM enrollment

0%
Низкий
20 дней назад

Уязвимостей на страницу