Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-26933
Analyzed
More InfoOfficial Page
Source-security@elastic.co
View Known Exploited Vulnerability (KEV) details
Published At-19 Mar, 2026 | 18:16
Updated At-23 Mar, 2026 | 13:33

Improper Validation of Array Index (CWE-129) in multiple protocol parser components in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker with the ability to send specially crafted, malformed network packets to a monitored network interface can trigger out-of-bounds read operations, resulting in application crashes or resource exhaustion. This requires the attacker to be positioned on the same network segment as the Packetbeat deployment or to control traffic routed to monitored interfaces.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.7MEDIUM
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 5.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Elasticsearch BV
elasticsearch
>>packetbeat>>Versions from 8.0.0(inclusive) to 8.19.11(exclusive)
cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:*
Elasticsearch BV
elasticsearch
>>packetbeat>>Versions from 9.0.0(inclusive) to 9.2.5(exclusive)
cpe:2.3:a:elasticsearch:packetbeat:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-129Secondarysecurity@elastic.co
CWE ID: CWE-129
Type: Secondary
Source: security@elastic.co
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://discuss.elastic.co/t/packetbeat-8-19-11-9-2-5-security-update-esa-2026-11/385533security@elastic.co
Vendor Advisory
Hyperlink: https://discuss.elastic.co/t/packetbeat-8-19-11-9-2-5-security-update-esa-2026-11/385533
Source: security@elastic.co
Resource:
Vendor Advisory
Change History
0Changes found

Details not found