{"id":"CVE-2025-62787","summary":"Wazuh Vulnerable to Heap-based Buffer Over-read in DecodeWinevt","details":"Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.10.2, a buffer over-read occurs in DecodeWinevt() when child_attr[p]-\u003eattributes[j] is accessed, because the corresponding index (j) is incorrect. A compromised agent can cause a READ operation beyond the end of the allocated buffer (which may contain sensitive information) by sending a specially crafted message to the wazuh manager. An attacker who is able to craft and send an agent message to the wazuh manager can cause a buffer over-read and potentially access sensitive data. While the buffer over-read is always triggered while resolving the arguments of mdebug2, specific configuration options (analysisd.debug=2) need to be in place for the respective data to be leaked. This vulnerability is fixed in 4.10.2.","aliases":["GHSA-3hhq-5367-98q6"],"modified":"2026-04-10T05:33:18.062778Z","published":"2025-10-29T16:30:26.950Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62787.json","cwe_ids":["CWE-126"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62787.json"},{"type":"ADVISORY","url":"https://github.com/wazuh/wazuh/security/advisories/GHSA-3hhq-5367-98q6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-62787"},{"type":"FIX","url":"https://github.com/wazuh/wazuh/commit/267d5d55de490469a9ec24a2b936bb3c5aa8fdda"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wazuh/wazuh","events":[{"introduced":"0"},{"fixed":"6457e4af487b95e35155817110f352f2e30744de"}]}],"versions":["v2.0","v3.1.0","v3.12.0","v3.13.0","v3.13.1","v3.2.0","v3.5.0","v3.6.0","v3.6.1","v3.7.0","v3.8.0","v4.10.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62787.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"}]}