Cyber Posture

CVE-2026-26061

High

Published: 27 March 2026

Published
27 March 2026
Modified
31 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0006 19.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26061 is a high-severity Allocation of Resources Without Limits or Throttling (CWE-770) vulnerability in Fleetdm Fleet. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-6 (Resource Availability).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-5 Denial-of-service Protection directly mitigates resource exhaustion attacks by requiring limits on resource consumption from oversized HTTP request bodies.

prevent

SI-9 Information Input Restrictions enforces limits on the volume and size of inputs like HTTP request bodies to prevent excessive memory allocation.

prevent

SC-6 Resource Availability implements controls to monitor and limit resource allocation, directly addressing unbounded memory use from large payloads.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Unauthenticated network-accessible HTTP endpoints in public-facing Fleet server allow resource exhaustion DoS via oversized request bodies, directly enabling T1190 exploitation of the application and T1499.004 application/system exploitation for availability impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Fleet is open source device management software. Prior to 4.81.0, Fleet contained multiple unauthenticated HTTP endpoints that read request bodies without enforcing a size limit. An unauthenticated attacker could exploit this behavior by sending large or repeated HTTP payloads, causing…

more

excessive memory allocation and resulting in a denial-of-service (DoS) condition. Version 4.81.0 patches the issue.

Deeper analysisAI

CVE-2026-26061 affects Fleet, an open source device management software, in versions prior to 4.81.0. The vulnerability stems from multiple unauthenticated HTTP endpoints that read request bodies without enforcing a size limit, enabling excessive memory allocation. This issue, classified under CWE-770 (Allocation of Resources Without Limits or Throttling), carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its high availability impact potential.

An unauthenticated attacker with network access can exploit this vulnerability by sending large or repeated HTTP payloads to the affected endpoints. The low attack complexity and lack of required privileges make it accessible to remote adversaries, resulting in a denial-of-service (DoS) condition through resource exhaustion.

The Fleet security advisory at https://github.com/fleetdm/fleet/security/advisories/GHSA-99hj-44vg-hfcp confirms that version 4.81.0 addresses the issue by patching the unauthenticated endpoints to enforce proper size limits on request bodies. Security practitioners should upgrade to Fleet 4.81.0 or later to mitigate this vulnerability.

Details

CWE(s)

Affected Products

fleetdm
fleet
≤ 4.81.0

CVEs Like This One

CVE-2026-23518Same product: Fleetdm Fleet
CVE-2026-34388Same product: Fleetdm Fleet
CVE-2026-34387Same product: Fleetdm Fleet
CVE-2026-26186Same product: Fleetdm Fleet
CVE-2026-26060Same product: Fleetdm Fleet
CVE-2026-34386Same product: Fleetdm Fleet
CVE-2026-34385Same product: Fleetdm Fleet
CVE-2026-23517Same product: Fleetdm Fleet
CVE-2026-27806Same product: Fleetdm Fleet
CVE-2026-29180Same product: Fleetdm Fleet

References