CVE-2025-68384
BaseFortify
Publication date: 2025-12-18
Last updated on: 2025-12-23
Assigner: Elastic
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| elastic | elasticsearch | From 7.0.0 (inc) to 7.17.29 (inc) |
| elastic | elasticsearch | From 8.0.0 (inc) to 8.19.9 (exc) |
| elastic | elasticsearch | From 9.0.0 (inc) to 9.1.9 (exc) |
| elastic | elasticsearch | From 9.2.0 (inc) to 9.2.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Elasticsearch involves allocation of resources without limits or throttling, allowing a low-privileged authenticated user to submit oversized user settings data. This can cause excessive allocation of resources leading to a persistent denial of service through an out-of-memory (OOM) crash.
How can this vulnerability impact me? :
The vulnerability can cause a persistent denial of service by crashing the Elasticsearch service due to out-of-memory conditions triggered by oversized user settings data submitted by a low-privileged user. This can disrupt availability of services relying on Elasticsearch.