Packetbeat Improper Bounds Check (ESA-2025-30)
Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.
Affected Versions:
- 7.x: All versions
- 8.x: All versions from 8.0.0 up to and including 8.19.8
- 9.x:
- All versions from 9.0.0 up to and including 9.1.8
- All versions from 9.2.0 up to and including 9.2.2
Affected Configurations:
Users using memcached collection
Solutions and Mitigations:
The issue is resolved in version 8.19.9, 9.1.9, and 9.2.3.
For Users that Cannot Upgrade:
Users can disable memcached collection in the Network Packet Capture integration if they are using Elastic Agent and would like other network collections to continue.
Severity: CVSSv3.1: 6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE ID: CVE-2025-68381