Vulnerability Description
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.11.0, fim_alert() implementation does not check whether the return value of ctime_r is NULL or not before calling strdup() on it. A compromised agent can cause a crash of analysisd by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause analysisd to crash and make it unavailable. This vulnerability is fixed in 4.11.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wazuh | Wazuh | < 4.11.0 |
Related Weaknesses (CWE)
References
- https://github.com/wazuh/wazuh/security/advisories/GHSA-8rvq-mm2f-8q22ExploitVendor Advisory
FAQ
What is CVE-2025-62789?
CVE-2025-62789 is a vulnerability with a CVSS score of 7.5 (HIGH). Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.11.0, fim_alert() implementation does not check whether the return value of ctime_r is NULL or ...
How severe is CVE-2025-62789?
CVE-2025-62789 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-62789?
Check the references section above for vendor advisories and patch information. Affected products include: Wazuh Wazuh.