Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.10.2, a buffer over-read occurs in DecodeWinevt() when child_attr[p]->attributes[j] is accessed, because the corresponding index (j) is incorrect. A compromised agent can cause a READ operation beyond the end of the allocated buffer (which may contain sensitive information) by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause a buffer over-read and potentially access sensitive data. While the buffer over-read is always triggered while resolving the arguments of mdebug2, specific configuration options (analysisd.debug=2) need to be in place for the respective data to be leaked. This vulnerability is fixed in 4.10.2.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:* | |
| Metrics | 
        
        cvssV3_1
         
  | 
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Wazuh
         Wazuh wazuh  | 
|
| Vendors & Products | 
        
        Wazuh
         Wazuh wazuh  | 
Wed, 29 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 29 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.10.2, a buffer over-read occurs in DecodeWinevt() when child_attr[p]->attributes[j] is accessed, because the corresponding index (j) is incorrect. A compromised agent can cause a READ operation beyond the end of the allocated buffer (which may contain sensitive information) by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause a buffer over-read and potentially access sensitive data. While the buffer over-read is always triggered while resolving the arguments of mdebug2, specific configuration options (analysisd.debug=2) need to be in place for the respective data to be leaked. This vulnerability is fixed in 4.10.2. | |
| Title | Wazuh Vulnerable to Heap-based Buffer Over-read in DecodeWinevt | |
| Weaknesses | CWE-126 | |
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-29T16:30:26.950Z
Updated: 2025-10-29T17:38:48.781Z
Reserved: 2025-10-22T18:55:48.009Z
Link: CVE-2025-62787
Updated: 2025-10-29T17:38:37.954Z
Status : Analyzed
Published: 2025-10-29T17:15:36.517
Modified: 2025-11-03T19:35:38.197
Link: CVE-2025-62787
No data.
ReportizFlow