TROYANOSYVIRUS
Volver a CVEs

CVE-2025-24016

CRITICALCISA KEV
9.9

Descripcion

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix.

Detalles CVE

Puntuacion CVSS v3.19.9
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado2/10/2025
Ultima modificacion10/24/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorWazuh
ProductoWazuh Server
Nombre vulnerabilidadWazuh Server Deserialization of Untrusted Data Vulnerability
Fecha inclusion KEV2025-06-10
Fecha limite remediacion2025-07-01
Uso en ransomwareUnknown

Productos afectados

wazuh:wazuh

Debilidades (CWE)

CWE-502

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.