IP Address Spoofing Vulnerability in Fleet Device Management Software by FleetDM
CVE-2026-24000

6.9MEDIUM

Key Information:

Vendor

Fleetdm

Status
Vendor
CVE Published:
14 May 2026

What is CVE-2026-24000?

Fleet, an open-source device management software, has a vulnerability that allows both authenticated and unauthenticated users to spoof their apparent IP address by manipulating HTTP headers like X-Forwarded-For, X-Real-IP, and True-Client-IP. This trust in client-supplied IP address headers without adequate validation enables attackers to bypass per-IP rate limiting controls, potentially enhancing the success of brute-force and password-spraying attacks on authentication endpoints. While this vulnerability does not directly lead to authentication bypass, privilege escalation, data exposure, or remote code execution, it represents a significant risk to the integrity of rate limiting mechanisms. Fleet version 4.80.1 addresses this issue, and it is recommended to run Fleet behind a trusted reverse proxy or load balancer to mitigate the risk.

Affected Version(s)

fleet < 4.80.1

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.