Wazuh 4.11.1

CPE Details

Wazuh 4.11.1
4.11.1
2025-06-12
18h39 +00:00
2025-06-12
18h39 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:wazuh:wazuh:4.11.1:*:*:*:*:*:*:*

Informations

Vendor

wazuh

Product

wazuh

Version

4.11.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-62792 2025-10-29 16h15 +00:00 Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.12.0, a buffer over-read occurs in w_expression_match() when strlen() is called on str_test, because the corresponding buffer is not being properly NULL terminated during its allocation in OS_CleanMSG(). A compromised agent can cause a READ operation beyond the end of the allocated buffer (which may contain sensitive information) by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause a buffer over-read and potentially access sensitive data. This vulnerability is fixed in 4.12.0.
7.5
High