Home

Description

Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-18 | Updated 2025-12-18 | Assigner elastic




MEDIUM: 6.5CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-787 Out-of-bounds Write

Product status

Default status
unaffected

7.0.0 (semver)
affected

8.0.0 (semver)
affected

9.0.0 (semver)
affected

9.2.0 (semver)
affected

References

discuss.elastic.co/...2-3-security-update-esa-2025-30/384178

cve.org (CVE-2025-68381)

nvd.nist.gov (CVE-2025-68381)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.