Filebeat Syslog/Dissect BUF Overflow via Malformed Msg/Tokenizer
CVE-2025-68383 Published on December 18, 2025
Filebeat Improper Validation of Specified Index, Position, or Offset in Input
Improper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service (panic/crash) of the Filebeat process via either a malformed Syslog message or a malicious tokenizer pattern in the Dissect configuration.
Vulnerability Analysis
Weakness Type
Improper Validation of Specified Quantity in Input
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Affected Versions
Elastic Filebeat:- Version 7.0.0, <= 7.17.29 is affected.
- Version 8.0.0, <= 8.19.8 is affected.
- Version 9.0.0, <= 9.1.8 is affected.
- Version 9.2.0, <= 9.2.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.