← Voltar para CVEs
CVE-2026-25769
CRITICAL9.1
Descricao
Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue.
Detalhes CVE
Pontuacao CVSS v3.19.1
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosHIGH
Interacao do usuarioNONE
Publicado3/17/2026
Ultima modificacao3/19/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
wazuh:wazuh
Fraquezas (CWE)
CWE-502
Referencias
https://drive.google.com/drive/folders/1WlkKNmHexz8212OVED9O6M_3pI8b6qNI?usp=sharing(security-advisories@github.com)
https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5(security-advisories@github.com)
https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.