Github.Com Elastic Beats vulnerabilities
4 known vulnerabilities affecting github.com/elastic_beats.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2025-68388HIGH≥ 8.6.0, < 8.19.9≥ 9.0.0, < 9.1.9+1 more2025-12-19
CVE-2025-68388 [HIGH] CWE-770 Elasticsearch Packetbeat has Excessive Allocation of Memory and CPU via Malicious IPv4 Fragments
Elasticsearch Packetbeat has Excessive Allocation of Memory and CPU via Malicious IPv4 Fragments
Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to denial-of-service in Packetbeat.
ghsaosv
CVE-2025-68383MEDIUM≥ 0, ≤ 7.6.22025-12-19
CVE-2025-68383 [MEDIUM] CWE-120 Filebeat Beats has Buffer Overflow via Malformed Syslog Message or Malicious Tokenizer Pattern in Dissect Configuration
Filebeat Beats has Buffer Overflow via Malformed Syslog Message or Malicious Tokenizer Pattern in Dissect Configuration
Improper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service
ghsaosv
CVE-2023-49922MEDIUM≥ 8.0.0, < 8.11.3≥ 7.0.0, < 7.17.162023-12-12
CVE-2023-49922 [MEDIUM] CWE-532 Elastic Beats inserts sensitive information into log file
Elastic Beats inserts sensitive information into log file
An issue was discovered by Elastic whereby Beats and Elastic Agent would log a raw event in its own logs at the WARN or ERROR level if ingesting that event to Elasticsearch failed with any 4xx HTTP status code except 409 or 429. Depending on the nature of the event that Beats or Elastic Agent attempted to ingest, this could lead to the insertion of
ghsaosv
CVE-2017-11480HIGH≥ 0, < 5.6.4≥ 6.0.0-alpha1, < 6.0.02022-02-15
CVE-2017-11480 [HIGH] CWE-404 Denial of Service in Packetbeat
Denial of Service in Packetbeat
Packetbeat versions prior to 5.6.4 and 6.0.0 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic.
ghsaosv