This allows a compromised or rogue Velociraptor client to crash the server via out-of-memory (OOM) by sending crafted messages through the normal client communication channel.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
To remediate, you will need to upgrade your server https://www.velociraptor-docs.org/docs/deployment/server/upgrades/#upgrading-a-server-in-place-upgrade to the latest version of your release: * For 0.76 releases, upgrade immediately to v0.76.4 https://github.com/Velocidex/velociraptor/releases/download/v0.76/velociraptor-v0.76.4-linux-amd64 * For 0.75 releases, upgrade immediately to v0.75.9 https://github.com/Velocidex/velociraptor/releases/download/v0.75/velociraptor-v0.75.9-linux-amd64
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rapid7
Rapid7 velociraptor |
|
| Vendors & Products |
Rapid7
Rapid7 velociraptor |
Mon, 04 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Velociraptor versions prior to 0.76.4 contain a resource exhaustion vulnerability in the server's agent control channel. This allows a compromised or rogue Velociraptor client to crash the server via out-of-memory (OOM) by sending crafted messages through the normal client communication channel. | |
| Title | Unbounded Memory Allocation in VQLResponse Result-Set Writer | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2026-05-04T13:08:18.314Z
Reserved: 2026-04-24T03:35:48.568Z
Link: CVE-2026-6948
Updated: 2026-05-04T13:08:13.308Z
Status : Awaiting Analysis
Published: 2026-05-04T00:16:39.467
Modified: 2026-05-04T15:22:52.850
Link: CVE-2026-6948
No data.
OpenCVE Enrichment
Updated: 2026-05-04T04:00:10Z