CVE-2026-26933Improper Validation of Array Index in Elasticsearch Packetbeat

Severity
5.7MEDIUMNVD
EPSS
0.0%
top 99.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 19
Latest updateApr 7

Description

Improper Validation of Array Index (CWE-129) in multiple protocol parser components in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker with the ability to send specially crafted, malformed network packets to a monitored network interface can trigger out-of-bounds read operations, resulting in application crashes or resource exhaustion. This requires the attacker to be positioned on the same network segment as the Packetbeat deployment or to control traf

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.1 | Impact: 3.6

Affected Packages3 packages

NVDelasticsearch/packetbeat8.0.08.19.11+1
CVEListV5elastic/packetbeat9.0.09.2.4+1
Gogithub.com/elastic_beats_v7< 7.0.0-alpha2.0.20260126223743-dec1b31111ec

🔴Vulnerability Details

4
OSV
Packetbeat does not properly validate an array index in multiple protocol parser components in github.com/elastic/beats2026-04-07
GHSA
Packetbeat does not properly validate an array index in multiple protocol parser components2026-03-19
OSV
Packetbeat does not properly validate an array index in multiple protocol parser components2026-03-19
CVEList
Improper Validation of Array Index in Packetbeat Leading to Denial of Service2026-03-19

🕵️Threat Intelligence

1
Wiz
CVE-2026-26933 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-26933 — Improper Validation of Array Index | cvebase