PT-2025-44326 · Wazuh · Wazuh

Published

2025-01-23

·

Updated

2025-10-29

·

CVE-2025-62792

CVSS v3.1
7.5
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Name of the Vulnerable Software and Affected Versions Wazuh versions prior to 4.12.0
Description Wazuh, a free and open source platform for threat prevention, detection, and response, contains a flaw where a buffer over-read can occur in the
w expression match()
function. This happens when
strlen()
is called on
str test
because the corresponding buffer is not properly NULL terminated during allocation in
OS CleanMSG()
. A compromised agent can trigger a read operation beyond the allocated buffer's boundaries, potentially exposing sensitive information, by sending a specially crafted message to the Wazuh manager. An attacker who can craft and send an agent message to the Wazuh manager can exploit this issue.
Recommendations Update to Wazuh version 4.12.0 or later.

Exploit

Fix

Buffer Over-read

Weakness Enumeration

Related Identifiers

BDU:2025-14490
CVE-2025-62792
GHSA-2672-VFHM-XHR6

Affected Products

Wazuh