CVE-2025-62790
BaseFortify
Publication date: 2025-10-29
Last updated on: 2025-11-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wazuh | wazuh | to 4.11.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-252 | The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. |
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Wazuh versions prior to 4.11.0 where the function fim_fetch_attributes_state() does not check if the variable time_string is NULL before calling strlen() on it. A compromised agent can exploit this by sending a specially crafted message to the Wazuh manager, causing the analysisd process to crash.
How can this vulnerability impact me? :
An attacker who can send a crafted agent message to the Wazuh manager can cause the analysisd process to crash, making it unavailable. This can disrupt threat detection and response capabilities of the Wazuh platform.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Wazuh to version 4.11.0 or later, as this version contains the fix for the vulnerability that causes analysisd to crash when processing specially crafted agent messages.