Cyber Posture

CVE-2026-34391

High

Published: 27 March 2026

Published
27 March 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0003 7.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34391 is a high-severity Exposure of Data Element to Wrong Session (CWE-488) vulnerability in Fleetdm Fleet. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unsecured Credentials (T1552); ranked at the 7.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Unsecured Credentials (T1552) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to MDM commands, directly preventing a malicious enrolled device from accessing commands intended for other devices and exposing sensitive configuration data.

prevent

Requires timely identification, reporting, and remediation of flaws like the Windows MDM command processing vulnerability, mitigated by upgrading Fleet to version 4.81.1.

prevent

Enforces information flow control policies to restrict the flow of device-specific MDM commands and sensitive data like WiFi credentials and VPN secrets to authorized devices only.

MITRE ATT&CK Enterprise TechniquesAI

T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
T1602 Data from Configuration Repository Collection
Adversaries may collect data related to managed devices from configuration repositories.
Why these techniques?

Vulnerability enables unauthorized cross-device access to MDM commands, directly exposing WiFi/VPN credentials, secrets, and certificate payloads stored in the configuration repository.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Fleet is open source device management software. Prior to 4.81.1, a vulnerability in Fleet's Windows MDM command processing allows a malicious enrolled device to access MDM commands intended for other devices, potentially exposing sensitive configuration data such as WiFi credentials,…

more

VPN secrets, and certificate payloads across the entire Windows fleet. Version 4.81.1 patches the issue.

Deeper analysisAI

CVE-2026-34391 affects Fleet, an open source device management software. In versions prior to 4.81.1, a vulnerability in Fleet's Windows MDM command processing enables a malicious enrolled device to access MDM commands intended for other devices. This exposure can reveal sensitive configuration data, such as WiFi credentials, VPN secrets, and certificate payloads, across the entire Windows fleet. The issue carries a CVSS score of 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-488.

An attacker with a malicious device enrolled in the Fleet-managed Windows environment can exploit this vulnerability over the network with low complexity and no privileges or user interaction required. Successful exploitation allows the attacker to retrieve MDM commands targeted at other devices, resulting in high-impact unauthorized access to confidential configuration data fleet-wide.

Fleet's security advisory at https://github.com/fleetdm/fleet/security/advisories/GHSA-wg7j-pcc3-h4rh documents the vulnerability. Upgrading to version 4.81.1 patches the issue in the Windows MDM command processing.

Details

CWE(s)

Affected Products

fleetdm
fleet
≤ 4.81.1

CVEs Like This One

CVE-2026-34385Same product: Fleetdm Fleet
CVE-2026-29180Same product: Fleetdm Fleet
CVE-2026-23518Same product: Fleetdm Fleet
CVE-2026-26060Same product: Fleetdm Fleet
CVE-2026-34388Same product: Fleetdm Fleet
CVE-2026-34386Same product: Fleetdm Fleet
CVE-2026-23517Same product: Fleetdm Fleet
CVE-2026-26061Same product: Fleetdm Fleet
CVE-2026-26186Same product: Fleetdm Fleet
CVE-2026-27806Same product: Fleetdm Fleet

References