CVE-2026-26932Improper Validation of Array Index in Elasticsearch Packetbeat

Severity
7.5HIGHNVD
CNA5.7
EPSS
0.0%
top 93.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 26

Description

Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDelasticsearch/packetbeat8.0.08.19.11+1
CVEListV5elastic/packetbeat9.0.09.2.4+1

🔴Vulnerability Details

2
GHSA
GHSA-fg9r-q7mv-mcrw: Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (C2026-02-26
CVEList
Improper Validation of Array Index in Packetbeat Leading to Denial of Service2026-02-26

🕵️Threat Intelligence

1
Wiz
CVE-2026-26932 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-26932 — Improper Validation of Array Index | cvebase