CVE-2026-24899: Fleet Windows MDM Azure AD JWT Authentication Bypass
A vulnerability in Fleet’s Windows MDM enrollment flow allows authentication tokens from any Azure AD tenant to be accepted. Because Fleet validates JWT signatures using Microsoft’s multi-tenant JWKS endpoint but does not enforce the aud (audience) or iss (issuer) claims, any Microsoft-signed Azure AD access token containing the expected scopes can be used to authenticate to Fleet’s MDM endpoints.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-24899 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →