Impact
The Fleet Orbit agent executes a Tcl/expect script that embeds a password entered by a local user. A password containing the closing brace character terminates the literal Tcl send command and injects arbitrary Tcl commands. Because the agent runs as root, this injection grants the attacker full root privileges, enabling system compromise, data exfiltration, or modification of critical files. The vulnerability directly jeopardizes confidentiality, integrity, and availability of affected devices.
Affected Systems
All instances of the Fleet device management software using the Orbit agent before version 4.81.1 are affected. The flaw manifests during the FileVault disk encryption key rotation flow, which typically occurs on macOS systems where the agent prompts a user for a password and then executes it within a Tcl script. Any device running an earlier Fleet release that includes this flow is vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity, while the EPSS score below 1% suggests a low likelihood of exploitation under normal conditions. The likely attack vector is local, requiring the attacker to be an authenticated user who can trigger the password prompt; no remote trigger is described in the data. If exploited, the attacker would obtain unrestricted root access, representing a high-impact outcome. The vulnerability is not listed in CISA’s KEV catalog, so no publicly documented exploitation is known, but its presence in root execution makes it a serious threat for local users.
OpenCVE Enrichment
Github GHSA