Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 29 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wazuh is a free and open source platform used for threat prevention, detection, and response. fillData() implementation does not check whether value is NULL or not before calling os_strdup() on it. A compromised agent can cause a crash of analysisd by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause analysisd to crash and make it unavailable. This vulnerability is fixed in 4.10.2. | |
| Title | Wazuh fillData NULL pointer dereference causes analysisd crash | |
| Weaknesses | CWE-252 CWE-476 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-29T16:10:18.690Z
Reserved: 2025-10-22T18:55:48.009Z
Link: CVE-2025-62785
Updated: 2025-10-29T16:10:13.299Z
Status : Received
Published: 2025-10-29T16:15:34.690
Modified: 2025-10-29T16:15:34.690
Link: CVE-2025-62785
No data.
OpenCVE Enrichment
No data.