Impact
The vulnerability resides in the gRPC Launcher “PublishLogs” endpoint of the Fleet open source device management software. Certain unexpected input values are not validated, leading to the Fleet server process terminating when an authenticated request is processed. The crash renders the service unavailable, delivering an immediate and complete denial of service. No data is exposed, authentication is not bypassed, privilege is not escalated, and integrity is not affected.
Affected Systems
The issue affects fleetdm: fleet versions prior to 4.81.0. Updating to version 4.81.0 or later removes the problem.
Risk and Exploitability
With a CVSS score of 8.7, this flaw is considered high severity. The exploit requires an authenticated attacker possessing a Launcher node key, but once that is available, a single gRPC request can crash the server. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but the high CVSS indicates a serious risk if the conditions are met.
OpenCVE Enrichment
Github GHSA