Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.
References
| Link | Resource |
|---|---|
| https://discuss.elastic.co/t/packetbeat-8-19-9-9-1-9-and-9-2-3-security-update-esa-2025-30/384178 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 Dec 2025, 17:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://discuss.elastic.co/t/packetbeat-8-19-9-9-1-9-and-9-2-3-security-update-esa-2025-30/384178 - Vendor Advisory | |
| First Time |
Elasticsearch packetbeat
Elasticsearch |
|
| CPE | cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:* |
18 Dec 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-18 22:16
Updated : 2025-12-23 17:42
NVD link : CVE-2025-68381
Mitre link : CVE-2025-68381
CVE.ORG link : CVE-2025-68381
JSON object : View
Products Affected
elasticsearch
- packetbeat
CWE
CWE-787
Out-of-bounds Write
