CVE-2025-68390
BaseFortify
Publication date: 2025-12-18
Last updated on: 2025-12-23
Assigner: Elastic
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| elastic | elasticsearch | From 7.0.0 (inc) to 7.17.29 (inc) |
| elastic | elasticsearch | From 8.0.0 (inc) to 8.19.8 (exc) |
| elastic | elasticsearch | From 9.0.0 (inc) to 9.1.8 (exc) |
| elastic | elasticsearch | From 9.2.0 (inc) to 9.2.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Elasticsearch involves allocation of resources without limits or throttling (CWE-770). An authenticated user who has snapshot restore privileges can send a specially crafted HTTP request that causes excessive memory allocation (CAPEC-130), potentially leading to a denial of service (DoS).
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an authenticated user with snapshot restore privileges to cause excessive memory usage on the Elasticsearch server, which can lead to a denial of service (DoS). This can disrupt availability of the service.