Home

Description

Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.12.0, a buffer over-read occurs in w_expression_match() when strlen() is called on str_test, because the corresponding buffer is not being properly NULL terminated during its allocation in OS_CleanMSG(). A compromised agent can cause a READ operation beyond the end of the allocated buffer (which may contain sensitive information) by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause a buffer over-read and potentially access sensitive data. This vulnerability is fixed in 4.12.0.

PUBLISHED Reserved 2025-10-22 | Published 2025-10-29 | Updated 2025-10-29 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-126: Buffer Over-read

CWE-170: Improper Null Termination

Product status

< 4.12.0
affected

References

github.com/.../wazuh/security/advisories/GHSA-2672-vfhm-xhr6

cve.org (CVE-2025-62792)

nvd.nist.gov (CVE-2025-62792)

Download JSON