Impact
Heap buffer overflow in the Wazuh authentication daemon (authd) can corrupt heap memory when processing specially crafted input, leading to a denial of service of the authentication service. The vulnerability is categorized as CWE‑125 and results in low availability impact for users relying on remote authentication.
Affected Systems
The issue affects all current Wazuh deployments, with the vulnerability known to exist in version 4.3.10 and earlier. Any system running the authd component is potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while the EPSS score below 1 % shows that the likelihood of public exploitation is low at this time and the vulnerability is not listed in the CISA KEV catalogue. The likely attack vector is remote, via network traffic that reaches the authd daemon, requiring the attacker to send malformed packets that trigger the buffer overflow.
OpenCVE Enrichment