Description
Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted request. This causes the application to perform redundant processing operations that continuously consume system resources until service degradation or complete unavailability occurs.
Published: 2026-01-13
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Resource Exhaustion Leading to Denial of Service
Action: Patch
AI Analysis

Impact

Elastic Kibana’s Fleet component allocates system resources without limits or throttling, a defect identified as CWE-770. A specially crafted request triggers redundant processing operations that relentlessly consume CPU, memory, or disk I/O until the service becomes degraded or unavailable. This denial of service condition can affect all users of an impacted Kibana instance, compromising availability but not directly exposing data.

Affected Systems

The vulnerability affects the Elastic Kibana product. All versions that include the Fleet feature and have not yet applied the 8.19.10.9.1/8.19.10.9.2.4 security update are potentially vulnerable. Specific version numbers are not listed, so administrators should verify whether their Kibana release contains the Fleet component and apply the latest update.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity rating. The EPSS score is less than 1%, suggesting a low but nonzero likelihood of exploitation, and the vulnerability is not currently listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker can trigger the flaw by sending a specially crafted request to the Kibana Fleet endpoint over the network; no privileged access is required, though the attacker must be able to reach the Kibana service.

Generated by OpenCVE AI on April 18, 2026 at 06:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Kibana security update (8.19.10.9.1 or 8.19.10.9.2.4) to enforce resource limits on Fleet operations.
  • Restrict external access to the Kibana Fleet endpoint using firewall rules or network segmentation, limiting traffic to trusted internal networks.
  • If Fleet is not required, disable the feature or remove it from the configuration to eliminate the attack surface.

Generated by OpenCVE AI on April 18, 2026 at 06:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*

Thu, 15 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Elastic
Elastic kibana
Vendors & Products Elastic
Elastic kibana

Tue, 13 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Description Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted request. This causes the application to perform redundant processing operations that continuously consume system resources until service degradation or complete unavailability occurs.
Title Allocation of Resources Without Limits or Throttling in Kibana Leading to Excessive Allocation
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2026-01-13T21:25:28.056Z

Reserved: 2025-12-19T15:50:33.248Z

Link: CVE-2026-0530

cve-icon Vulnrichment

Updated: 2026-01-13T21:25:22.781Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T21:15:50.817

Modified: 2026-01-22T19:58:42.553

Link: CVE-2026-0530

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-13T21:03:13Z

Links: CVE-2026-0530 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:30:25Z

Weaknesses