{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T06:11:34.554","vulnerabilities":[{"cve":{"id":"CVE-2025-68383","sourceIdentifier":"security@elastic.co","published":"2025-12-18T22:16:02.387","lastModified":"2025-12-23T17:59:26.973","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service (panic/crash) of the Filebeat process via either a malformed Syslog message or a malicious tokenizer pattern in the Dissect configuration."}],"metrics":{"cvssMetricV31":[{"source":"security@elastic.co","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@elastic.co","type":"Secondary","description":[{"lang":"en","value":"CWE-1284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:filebeat:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndIncluding":"7.17.29","matchCriteriaId":"5523AEF7-039A-4A52-B6C8-9435D4B820EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:filebeat:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.19.9","matchCriteriaId":"BD5813C6-7671-4C8F-9C1D-321ACC50ACFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:filebeat:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.1.9","matchCriteriaId":"5CC85BA6-B896-4B0D-8BF9-E7B3BE778BBB"},{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:filebeat:*:*:*:*:*:*:*:*","versionStartIncluding":"9.2.0","versionEndExcluding":"9.2.3","matchCriteriaId":"36797C31-E939-4BEF-9607-7602869A0AD1"}]}]}],"references":[{"url":"https://discuss.elastic.co/t/filebeat-8-19-9-9-1-9-and-9-2-3-security-update-esa-2025-32/384180","source":"security@elastic.co","tags":["Vendor Advisory"]}]}}]}