A vulnerability in Fleet’s Android MDM Pub/Sub handling could allow unauthenticated requests to trigger device unenrollment events. This may result in unauthorized removal of individual Android devices from Fleet management.
If Android MDM is enabled, an attacker could send a crafted request to the Android Pub/Sub endpoint to unenroll a targeted Android device from Fleet without authentication.
This issue does not grant access to Fleet, allow execution of commands, or provide visibility into device data. Impact is limited to disruption of Android device management for the affected device.
If an immediate upgrade is not possible, affected Fleet users should temporarily disable Android MDM.
If there any questions or comments about this advisory:
Email Fleet at security@fleetdm.com Join #fleet in osquery Slack
Fleet thanks @secfox-ai for responsibly reporting this issue.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-306",
"CWE-862"
],
"github_reviewed_at": "2026-02-26T19:38:56Z",
"nvd_published_at": "2026-02-26T03:16:04Z",
"severity": "MODERATE"
}