-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CVE Vulnerability Details :
CVE-2026-45392
PUBLISHED
More Info
Official Page
Assigner
-
Cribl
Assigner Org ID
-
af879a92-7297-456a-bb0e-905ac6c64bdc
View Known Exploited Vulnerability (KEV) details
Published At
-
12 May, 2026 | 01:06
Updated At
-
15 May, 2026 | 10:56
Rejected At
-
▼
CVE Numbering Authority (CNA)
Reserved. Details will be published at disclosure.
Affected Products
Vendor
Cribl
Product
Cribl Stream
Default Status
unaffected
Versions
Affected
From
0
before
4.17.1
(semver)
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://docs.cribl.io/stream/release-notes/release-v4171#security-fixes
release-notes
https://trust.cribl.io/notifications
vendor-advisory
Hyperlink:
https://docs.cribl.io/stream/release-notes/release-v4171#security-fixes
Resource:
release-notes
Hyperlink:
https://trust.cribl.io/notifications
Resource:
vendor-advisory
▼
Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
Type
CWE ID
Description
CWE
CWE-20
CWE-20 Improper Input Validation
Type:
CWE
CWE ID:
CWE-20
Description:
CWE-20 Improper Input Validation
Metrics
Version
Base score
Base severity
Vector
3.1
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version:
3.1
Base score:
9.8
Base severity:
CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
Details not found