Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2mj3-6grc-px38 | Filebeat Beats has Buffer Overflow via Malformed Syslog Message or Malicious Tokenizer Pattern in Dissect Configuration |
Tue, 23 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:elastic:filebeat:*:*:*:*:*:*:*:* |
Fri, 19 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elastic
Elastic filebeat |
|
| Vendors & Products |
Elastic
Elastic filebeat |
Thu, 18 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service (panic/crash) of the Filebeat process via either a malformed Syslog message or a malicious tokenizer pattern in the Dissect configuration. | |
| Title | Filebeat Improper Validation of Specified Index, Position, or Offset in Input | |
| Weaknesses | CWE-1284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2025-12-19T15:15:02.819Z
Reserved: 2025-12-16T17:26:09.355Z
Link: CVE-2025-68383
Updated: 2025-12-19T15:14:53.383Z
Status : Analyzed
Published: 2025-12-18T22:16:02.387
Modified: 2025-12-23T17:59:26.973
Link: CVE-2025-68383
No data.
OpenCVE Enrichment
Updated: 2025-12-19T09:15:38Z
Github GHSA