FKIE_CVE-2026-0531
Vulnerability from fkie_nvd - Published: 2026-01-13 21:15 - Updated: 2026-01-22 19:59
Severity ?
Summary
Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted bulk retrieval request. This requires an attacker to have low-level privileges equivalent to the viewer role, which grants read access to agent policies. The crafted request can cause the application to perform redundant database retrieval operations that immediately consume memory until the server crashes and becomes unavailable to all users.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1863989E-58AD-4481-B872-DF5AC637F854",
"versionEndExcluding": "7.17.29",
"versionStartIncluding": "7.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8707CF69-9922-490B-B64F-38F2D31E2CA1",
"versionEndExcluding": "8.19.10",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC3281ED-A331-43DC-9705-80A3FA3E6C75",
"versionEndExcluding": "9.1.10",
"versionStartIncluding": "9.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF9D6AE-B07F-4516-A684-60B02BF731A0",
"versionEndExcluding": "9.2.4",
"versionStartIncluding": "9.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted bulk retrieval request. This requires an attacker to have low-level privileges equivalent to the viewer role, which grants read access to agent policies. The crafted request can cause the application to perform redundant database retrieval operations that immediately consume memory until the server crashes and becomes unavailable to all users."
},
{
"lang": "es",
"value": "Asignaci\u00f3n de Recursos Sin L\u00edmites o Limitaci\u00f3n (CWE-770) en Kibana Fleet puede conducir a una Asignaci\u00f3n Excesiva (CAPEC-130) a trav\u00e9s de una solicitud de recuperaci\u00f3n masiva especialmente dise\u00f1ada. Esto requiere que un atacante tenga privilegios de bajo nivel equivalentes al rol de visor, que otorga acceso de lectura a las pol\u00edticas de agente. La solicitud dise\u00f1ada puede hacer que la aplicaci\u00f3n realice operaciones redundantes de recuperaci\u00f3n de base de datos que consumen memoria inmediatamente hasta que el servidor se bloquea y deja de estar disponible para todos los usuarios."
}
],
"id": "CVE-2026-0531",
"lastModified": "2026-01-22T19:59:54.277",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security@elastic.co",
"type": "Secondary"
}
]
},
"published": "2026-01-13T21:15:50.990",
"references": [
{
"source": "security@elastic.co",
"tags": [
"Vendor Advisory"
],
"url": "https://discuss.elastic.co/t/kibana-8-19-10-9-1-10-9-2-4-security-update-esa-2026-04/384522"
}
],
"sourceIdentifier": "security@elastic.co",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "security@elastic.co",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…