CVE-2026-26932
Improper Validation of Array Index in Packetbeat Leading to Denial of Service
CVSS Score
5.7
EPSS Score
0.0%
EPSS Percentile
0th
Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port.
| CWE | CWE-129 |
| Vendor | elastic |
| Product | packetbeat |
| Published | Feb 26, 2026 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for elastic packetbeat
Be the first to know when new medium vulnerabilities affecting elastic packetbeat are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
Elastic / Packetbeat
9.0.0 โค 9.2.4 8.0.0 โค 8.19.10
References
Credits
๐ giant_anteater