Impact
The vulnerability is caused by calling a synchronous disk I/O function (`generate_keypair`) inside an asynchronous event loop, which blocks the single‑threaded Starlette/Asyncio loop on every bearer‑token request. An attacker can flood the API with requests that include invalid bearer tokens, causing repeated blocking and starvations of CPU resources. The result is a denial of service that prevents legitimate connections from being handled. This weakness is classified as CWE‑400: Uncontrolled Resource Consumption.
Affected Systems
Affects the Wazuh platform (vendor: wazuh:wazuh). Versions starting at 4.3.0 up through 4.14.2 are vulnerable; the issue is fixed in 4.14.3 and later.
Risk and Exploitability
With a CVSS score of 5.3 and an EPSS score of less than 1 %, the vulnerability is unlikely to be widely exploited yet. It is not listed in the CISA KEV catalog. The attack vector is remote, unauthenticated, and relies on flooding the API with malformed bearer tokens to block the event loop.
OpenCVE Enrichment