
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-42463 affects Wazuh, a free and open source platform used for threat prevention, detection, and response. The vulnerability was discovered and disclosed on January 12, 2024, affecting all versions of Wazuh prior to version 4.5.3. This security issue involves a stack overflow hazard in the Log Collector component (NVD, GitHub Advisory).
The vulnerability is classified as a stack-based buffer overflow (CWE-121) that specifically affects the processing of the multilines log format. The issue stems from improper validation of user-supplied data, which can result in an integer underflow before writing to memory. The vulnerability has received a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, ZDI).
The vulnerability can lead to local privilege escalation, potentially allowing an attacker to execute arbitrary code in the context of root. This presents a significant security risk as it could enable unauthorized elevation of privileges and complete system compromise (ZDI).
The vulnerability has been patched in Wazuh version 4.5.3. For users unable to update immediately, a temporary workaround is available by either disabling multiline functionality or replacing it with multiline_regex (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."