PT-2026-40967 · Fleet · Fleet
Published
2026-05-14
·
Updated
2026-05-14
·
CVE-2026-23998
CVSS v4.0
8.2
High
| Vector | AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
Fleet versions prior to 4.81.0
Description
A flaw in the Windows MDM management endpoint allows requests to be processed without proper client certificate validation. The endpoint relies on mutual TLS (mTLS)—a process where both the client and server authenticate each other via certificates—to authenticate enrolled devices. In affected versions, requests lacking a client certificate may be incorrectly treated as trusted. An attacker with knowledge of a valid enrolled device identifier could impersonate that device to retrieve sensitive configuration payloads, such as VPN or Wi-Fi configuration data, certificates, or other secrets delivered through MDM profiles. This issue is limited to the targeted Windows device and does not grant administrative access to the control plane or allow the enrollment of new devices.
Recommendations
Update to version 4.81.0.
As a temporary workaround, disable Windows MDM.
Fix
Improper Certificate Validation
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Fleet