CVE-2025-68381

Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:*
cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:*
cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:*
cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:*

History

23 Dec 2025, 17:42

Type Values Removed Values Added
References () https://discuss.elastic.co/t/packetbeat-8-19-9-9-1-9-and-9-2-3-security-update-esa-2025-30/384178 - () https://discuss.elastic.co/t/packetbeat-8-19-9-9-1-9-and-9-2-3-security-update-esa-2025-30/384178 - Vendor Advisory
First Time Elasticsearch packetbeat
Elasticsearch
CPE cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:*

18 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 22:16

Updated : 2025-12-23 17:42


NVD link : CVE-2025-68381

Mitre link : CVE-2025-68381

CVE.ORG link : CVE-2025-68381


JSON object : View

Products Affected

elasticsearch

  • packetbeat
CWE
CWE-787

Out-of-bounds Write