Cyber Posture

CVE-2026-27806

High

Published: 08 April 2026

Published
08 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 3.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27806 is a high-severity OS Command Injection (CWE-78) vulnerability in Fleetdm Fleet. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection by validating and sanitizing the user password input before interpolating it into the Tcl/expect script.

prevent

Ensures timely remediation of the specific command injection flaw through patching to Orbit agent version 4.81.1 or later.

prevent

Limits the impact of successful command injection by enforcing least privilege on the root-running Orbit agent process.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local unprivileged user exploits command injection in root-running Orbit agent (Tcl/expect script) during FileVault key rotation to execute arbitrary commands, directly enabling T1068 Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Fleet is open source device management software. Prior to 4.81.1, the Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via exec.Command("expect",…

more

"-c", script). Because the password is inserted into Tcl brace-quoted send {%s}, a password containing } terminates the literal and injects arbitrary Tcl commands. Since Orbit runs as root, this allows a local unprivileged user to escalate to root privileges. This vulnerability is fixed in 4.81.1.

Deeper analysisAI

CVE-2026-27806 is a command injection vulnerability (CWE-78) in Fleet, an open source device management software. It affects the Orbit agent prior to version 4.81.1, specifically in the FileVault disk encryption key rotation flow. The agent collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed with exec.Command("expect", "-c", script). Due to the use of Tcl brace-quoted send {%s}, a password containing a closing brace "}" terminates the literal early, enabling injection of arbitrary Tcl commands. The vulnerability has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local unprivileged user can exploit this during the key rotation process by entering a password that includes a "}" character, followed by malicious Tcl commands. Since the Orbit agent runs as root, successful exploitation allows the attacker to execute arbitrary commands with root privileges, achieving full privilege escalation on the affected system.

The Fleet security advisory at https://github.com/fleetdm/fleet/security/advisories/GHSA-rphv-h674-5hp2 confirms the issue and states that it is fixed in Orbit agent version 4.81.1. Security practitioners should update to this version or later to mitigate the vulnerability.

Details

CWE(s)

Affected Products

fleetdm
fleet
≤ 4.81.1

CVEs Like This One

CVE-2026-29180Same product: Fleetdm Fleet
CVE-2026-34387Same product: Fleetdm Fleet
CVE-2026-34385Same product: Fleetdm Fleet
CVE-2026-26060Same product: Fleetdm Fleet
CVE-2026-34388Same product: Fleetdm Fleet
CVE-2026-34391Same product: Fleetdm Fleet
CVE-2026-23517Same product: Fleetdm Fleet
CVE-2026-26061Same product: Fleetdm Fleet
CVE-2026-23518Same product: Fleetdm Fleet
CVE-2026-34386Same product: Fleetdm Fleet

References