Cyber Posture

CVE-2026-34388

High

Published: 27 March 2026

Published
27 March 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0006 18.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34388 is a high-severity Improper Check or Handling of Exceptional Conditions (CWE-703) vulnerability in Fleetdm Fleet. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 18.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-11 directly addresses the improper handling of exceptional conditions by requiring the system to manage errors like unexpected log type values without compromising availability or crashing the server.

prevent

SI-10 mandates validation of information inputs to the gRPC Launcher endpoint, preventing crashes from malformed or unexpected log type values.

prevent

SC-5 implements denial-of-service protections to limit the effects of crafted requests exploiting the gRPC endpoint's vulnerability, maintaining server availability.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

CVE enables direct application DoS via crafted gRPC input triggering process crash (T1499.004 Application or System Exploitation).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Fleet is open source device management software. Prior to 4.81.0, a denial-of-service vulnerability in Fleet's gRPC Launcher endpoint allows an authenticated host to crash the entire Fleet server process by sending an unexpected log type value. The server terminates immediately,…

more

disrupting all connected hosts, MDM enrollments, and API consumers. Version 4.81.0 patches the issue.

Deeper analysisAI

CVE-2026-34388 is a denial-of-service vulnerability in Fleet, an open source device management software. The issue affects versions prior to 4.81.0 and resides in Fleet's gRPC Launcher endpoint, where the server fails to handle an unexpected log type value properly, leading to an immediate process termination. This flaw is classified under CWE-703 (Improper Check or Handling of Exceptional Conditions) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its high availability impact with network accessibility and low complexity.

An authenticated host enrolled in Fleet can exploit this vulnerability by sending a specially crafted unexpected log type value via the gRPC Launcher endpoint. Successful exploitation crashes the entire Fleet server process without warning, resulting in widespread disruption: all connected hosts lose management capabilities, MDM enrollments fail, and API consumers are blocked from operations until the server restarts. Attackers require only valid host authentication, typically granted during normal device enrollment.

The Fleet security advisory at https://github.com/fleetdm/fleet/security/advisories/GHSA-w254-4hp5-7cvv details the patch in version 4.81.0, which addresses the improper handling in the gRPC endpoint. Security practitioners should upgrade to 4.81.0 or later and monitor for anomalous gRPC traffic from enrolled hosts to mitigate exposure.

Details

CWE(s)

Affected Products

fleetdm
fleet
≤ 4.81.0

CVEs Like This One

CVE-2026-26061Same product: Fleetdm Fleet
CVE-2026-29180Same product: Fleetdm Fleet
CVE-2026-34391Same product: Fleetdm Fleet
CVE-2026-23518Same product: Fleetdm Fleet
CVE-2026-26060Same product: Fleetdm Fleet
CVE-2026-34385Same product: Fleetdm Fleet
CVE-2026-34386Same product: Fleetdm Fleet
CVE-2026-23517Same product: Fleetdm Fleet
CVE-2026-26186Same product: Fleetdm Fleet
CVE-2026-27806Same product: Fleetdm Fleet

References