Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 23 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elasticsearch
Elasticsearch packetbeat |
|
| CPEs | cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Elasticsearch
Elasticsearch packetbeat |
Fri, 19 Dec 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elastic
Elastic packetbeat |
|
| Vendors & Products |
Elastic
Elastic packetbeat |
Thu, 18 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number. | |
| Title | Packetbeat Improper Bounds Check | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2025-12-18T22:03:05.834Z
Reserved: 2025-12-16T17:26:09.355Z
Link: CVE-2025-68381
Updated: 2025-12-18T22:03:03.141Z
Status : Analyzed
Published: 2025-12-18T22:16:02.070
Modified: 2025-12-23T17:42:32.230
Link: CVE-2025-68381
No data.
OpenCVE Enrichment
Updated: 2025-12-19T09:15:48Z