Description
Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbeat.
Published: 2025-12-18
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fj69-23m4-ccvv Elasticsearch Packetbeat has Excessive Allocation of Memory and CPU via Malicious IPv4 Fragments
History

Tue, 23 Dec 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Elasticsearch
Elasticsearch packetbeat
CPEs cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:*
Vendors & Products Elasticsearch
Elasticsearch packetbeat

Fri, 19 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
Title Packetbeat Allocation of Resources Without Limits or Throttling

Fri, 19 Dec 2025 12:00:00 +0000

Type Values Removed Values Added
Description Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to denial-of-service in Packetbeat. Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbeat.
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Elastic
Elastic packetbeat
Vendors & Products Elastic
Elastic packetbeat

Thu, 18 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to denial-of-service in Packetbeat.
Title Packetbeat Allocation of Resources Without Limits or Throttling
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Elastic Packetbeat
Elasticsearch Packetbeat
cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2025-12-19T11:46:39.524Z

Reserved: 2025-12-16T19:18:49.563Z

Link: CVE-2025-68388

cve-icon Vulnrichment

Updated: 2025-12-18T21:48:45.365Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-18T22:16:02.683

Modified: 2025-12-23T17:43:47.567

Link: CVE-2025-68388

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-19T09:15:46Z

Weaknesses