Skip to content

Denial of Service via unhandled gRPC log type in launcher endpoint

High
lukeheath published GHSA-w254-4hp5-7cvv Mar 27, 2026

Package

gomod github.com/fleetdm/fleet (Go)

Affected versions

< 4.81.0

Patched versions

>= 4.81.0

Description

Summary

A denial-of-service vulnerability in Fleet's gRPC Launcher endpoint allows an authenticated host to crash the entire Fleet server process by sending an unexpected log type value. The server terminates immediately, disrupting all connected hosts, MDM enrollments, and API consumers.

Impact

An attacker with access to a valid Launcher node key can send a specially crafted gRPC request to the Fleet server that triggers an unrecoverable server crash. The gRPC server lacks appropriate error recovery handling, meaning the entire Fleet process terminates rather than gracefully rejecting the malformed input.

Because the crash is instant and repeatable, an attacker could script repeated requests to prevent the server from recovering, resulting in a persistent denial of service until a patched version is deployed.

Workarounds

There is no workaround for this issue other than upgrading to a patched version.

For more information

If you have any questions or comments about this advisory:

Email us at security@fleetdm.com

Join #fleet in osquery Slack

Credits

We thank @fuzzztf for responsibly reporting this issue.

Severity

High

CVE ID

CVE-2026-34388

Weaknesses

No CWEs

Credits