{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-34388","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-27T13:45:29.619Z","datePublished":"2026-03-27T19:13:00.388Z","dateUpdated":"2026-03-31T13:44:23.562Z"},"containers":{"cna":{"title":"Fleet vulnerable to Denial of Service via unhandled gRPC log type in launcher endpoint","problemTypes":[{"descriptions":[{"cweId":"CWE-703","lang":"en","description":"CWE-703: Improper Check or Handling of Exceptional Conditions","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":6.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U","version":"4.0"}}],"references":[{"name":"https://github.com/fleetdm/fleet/security/advisories/GHSA-w254-4hp5-7cvv","tags":["x_refsource_CONFIRM"],"url":"https://github.com/fleetdm/fleet/security/advisories/GHSA-w254-4hp5-7cvv"}],"affected":[{"vendor":"fleetdm","product":"fleet","versions":[{"version":"< 4.81.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-27T19:13:00.388Z"},"descriptions":[{"lang":"en","value":"Fleet is open source device management software. Prior to 4.81.0, a denial-of-service vulnerability in Fleet's gRPC Launcher endpoint allows an authenticated host to crash the entire Fleet server process by sending an unexpected log type value. The server terminates immediately, disrupting all connected hosts, MDM enrollments, and API consumers. Version 4.81.0 patches the issue."}],"source":{"advisory":"GHSA-w254-4hp5-7cvv","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-31T13:43:45.848886Z","id":"CVE-2026-34388","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-31T13:44:23.562Z"}}]}}