INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors HIGH 3h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 4h Global ddos Technology and Social Media HIGH 4h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors / Critical Infrastructure CRITICAL 5h Global malware Financial Services CRITICAL 6h Global general Software/Technology LOW 6h Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors HIGH 3h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 4h Global ddos Technology and Social Media HIGH 4h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors / Critical Infrastructure CRITICAL 5h Global malware Financial Services CRITICAL 6h Global general Software/Technology LOW 6h Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors HIGH 3h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 4h Global ddos Technology and Social Media HIGH 4h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors / Critical Infrastructure CRITICAL 5h Global malware Financial Services CRITICAL 6h Global general Software/Technology LOW 6h
Vulnerabilities

CVE-2026-26060

High
Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user
CWE-613 — Weakness Type
Published: Mar 27, 2026  ·  Modified: Apr 3, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user changes their password. As a result, a stale password reset token could be reused to reset the account password even after a defensive password change. Version 4.81.0 patches the issue.

🤖 AI Executive Summary

CVE-2026-26060 is a critical authentication bypass vulnerability in Fleet device management software affecting versions prior to 4.81.0. Stale password reset tokens remain valid after password changes, allowing attackers to reset user accounts using previously issued tokens. This vulnerability poses significant risk to organizations managing large device fleets, particularly in Saudi Arabia's critical infrastructure sectors.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 20:52
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability directly impacts Saudi organizations managing device fleets across critical sectors: (1) Banking/SAMA-regulated institutions using Fleet for endpoint management and compliance monitoring; (2) Government agencies (NCA, NCSC) managing security infrastructure; (3) Energy sector (ARAMCO, SEC) controlling SCADA and industrial device networks; (4) Telecom providers (STC, Mobily, Zain) managing network infrastructure; (5) Healthcare organizations managing medical devices and IT infrastructure. The token reuse vulnerability enables account takeover of administrative accounts, potentially compromising entire device management infrastructure and sensitive operational data.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Energy and Utilities Telecommunications Healthcare Critical Infrastructure Defense and Security
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Fleet instances running versions prior to 4.81.0 across your organization
2. Invalidate all existing password reset tokens immediately in the Fleet database
3. Force password reset for all administrative and privileged accounts
4. Enable audit logging for all password reset and authentication events
5. Monitor for suspicious password reset activities in logs

PATCHING GUIDANCE:
1. Upgrade Fleet to version 4.81.0 or later as soon as available
2. Test patch in non-production environment first
3. Schedule maintenance window for production deployment
4. Verify token invalidation after upgrade

COMPENSATING CONTROLS (if upgrade delayed):
1. Implement IP-based restrictions on password reset endpoints
2. Require multi-factor authentication for all administrative accounts
3. Implement rate limiting on password reset requests
4. Deploy WAF rules to detect token reuse patterns
5. Restrict password reset functionality to specific time windows

DETECTION RULES:
1. Alert on multiple password reset attempts using same token
2. Monitor for password reset requests from unusual IP addresses
3. Track failed authentication attempts followed by successful password resets
4. Log all token generation and validation events
5. Alert on administrative account password changes outside normal change windows
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع نسخ Fleet التي تعمل بإصدارات سابقة للإصدار 4.81.0 في جميع أنحاء المنظمة
2. إلغاء جميع رموز إعادة تعيين كلمة المرور الموجودة فوراً في قاعدة بيانات Fleet
3. فرض إعادة تعيين كلمة المرور لجميع الحسابات الإدارية والمميزة
4. تفعيل تسجيل التدقيق لجميع أحداث إعادة تعيين كلمة المرور والمصادقة
5. مراقبة الأنشطة المريبة لإعادة تعيين كلمة المرور في السجلات

إرشادات التصحيح:
1. ترقية Fleet إلى الإصدار 4.81.0 أو أحدث عند توفره
2. اختبار التصحيح في بيئة غير الإنتاج أولاً
3. جدولة نافذة صيانة لنشر الإنتاج
4. التحقق من إلغاء الرمز بعد الترقية

الضوابط البديلة (إذا تأخر الترقية):
1. تنفيذ قيود قائمة على IP على نقاط نهاية إعادة تعيين كلمة المرور
2. طلب المصادقة متعددة العوامل لجميع الحسابات الإدارية
3. تنفيذ تحديد معدل على طلبات إعادة تعيين كلمة المرور
4. نشر قواعد WAF للكشف عن أنماط إعادة استخدام الرموز
5. تقييد وظيفة إعادة تعيين كلمة المرور إلى نوافذ زمنية محددة

قواعد الكشف:
1. تنبيه على محاولات إعادة تعيين كلمة المرور المتعددة باستخدام نفس الرمز
2. مراقبة طلبات إعادة تعيين كلمة المرور من عناوين IP غير المعتادة
3. تتبع محاولات المصادقة الفاشلة متبوعة بإعادة تعيين كلمة المرور الناجحة
4. تسجيل جميع أحداث توليد التحقق من الرموز
5. تنبيه على تغييرات كلمة المرور للحساب الإداري خارج نوافذ التغيير العادية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.9.2.1 - User registration and access rights management ECC 2024 A.9.2.4 - Password management system requirements ECC 2024 A.9.4.3 - Password change procedures ECC 2024 A.9.4.4 - Password storage and transmission security
🔵 SAMA CSF
SAMA CSF ID.AM-1 - Asset management and inventory SAMA CSF PR.AC-1 - Access control policy and procedures SAMA CSF PR.AC-6 - Authentication and authorization mechanisms SAMA CSF DE.CM-1 - Detection and monitoring of unauthorized access
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 - Access control ISO 27001:2022 A.5.16 - Authentication ISO 27001:2022 A.5.18 - Management of privileged access rights ISO 27001:2022 A.8.3 - Logging
🟣 PCI DSS v4.0
PCI DSS 2.1 - Change default passwords PCI DSS 6.5.10 - Broken authentication PCI DSS 7.1 - Limit access to system components PCI DSS 10.2 - Implement automated audit trails
📦 Affected Products / CPE 1 entries
fleetdm:fleet
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-613
EPSS0.05%
Exploit No
Patch ✗ No
Published 2026-03-27
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-613
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.