Improper Validation of Array Index in Packetbeat Leading to Overflow Buffers (ESA-2026-02)
Improper Validation of Array Index (CWE-129) in Packetbeat’s MongoDB protocol parser can allow an attacker to cause Overflow Buffers (CAPEC-100) through specially crafted network traffic. This requires an attacker to send a malformed payload to a monitored network interface where MongoDB protocol parsing is enabled.
Affected Versions:
- 7.x: All versions
- 8.x: All versions from 8.0.0 up to and including 8.19.9
- 9.x:
- All versions from 9.0.0 up to and including 9.1.9
- All versions from 9.2.0 up to and including 9.2.3
Solutions and Mitigations:
The issue is resolved in version 8.19.10, 9.1.10, 9.2.4.
For Users that Cannot Upgrade:
There are no workarounds
Acknowledgements:
We would like to thank AISLE Research for responsibly disclosing this vulnerability to Elastic
Severity: CVSSv3.1: Medium (6.5) - AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE ID: CVE-2026-0529
Problem Type: CWE-129 - Improper Validation of Array Index
Impact: CAPEC-100 - Overflow Buffers