Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-45393
PUBLISHED
More InfoOfficial Page
Assigner-Cribl
Assigner Org ID-af879a92-7297-456a-bb0e-905ac6c64bdc
View Known Exploited Vulnerability (KEV) details
Published At-12 May, 2026 | 01:06
Updated At-15 May, 2026 | 20:04
Rejected At-
▼CVE Numbering Authority (CNA)

Reserved. Details will be published at disclosure.

Affected Products
Vendor
Cribl
Product
Cribl Edge
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From 0 before 4.17.1 (semver)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.cribl.io/edge/release-notes/release-v4171#security-fixes
release-notes
https://trust.cribl.io/notifications
vendor-advisory
Hyperlink: https://docs.cribl.io/edge/release-notes/release-v4171#security-fixes
Resource:
release-notes
Hyperlink: https://trust.cribl.io/notifications
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20 Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20 Improper Input Validation
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found