CVE-2025-62790

7.5 HIGH

📋 TL;DR

A NULL pointer dereference vulnerability in Wazuh's analysisd component allows a compromised agent to crash the manager by sending a specially crafted message. This causes denial of service, making threat detection unavailable. Organizations running Wazuh versions before 4.11.0 are affected.

💻 Affected Systems

Products:
  • Wazuh
Versions: All versions prior to 4.11.0
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All Wazuh deployments with agents communicating to manager are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Analysisd crashes repeatedly, causing complete loss of threat detection and response capabilities until service is restored.

🟠

Likely Case

Intermittent analysisd crashes leading to gaps in security monitoring and alerting.

🟢

If Mitigated

Minimal impact with proper network segmentation and agent integrity controls in place.

🌐 Internet-Facing: LOW (analysisd typically listens on internal interfaces only)
🏢 Internal Only: HIGH (compromised internal agents can directly exploit this)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires agent compromise first, then simple crafted message to trigger crash.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.11.0

Vendor Advisory: https://github.com/wazuh/wazuh/security/advisories/GHSA-9xj3-vc52-48p9

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Stop Wazuh services. 3. Upgrade to Wazuh 4.11.0 using package manager or source. 4. Restart all Wazuh services.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict agent-manager communication to trusted networks only

iptables -A INPUT -s <agent_subnet> -p tcp --dport 1514 -j ACCEPT
iptables -A INPUT -p tcp --dport 1514 -j DROP

🧯 If You Can't Patch

  • Implement strict agent integrity monitoring and alerting
  • Deploy network monitoring for abnormal agent-manager communication patterns

🔍 How to Verify

Check if Vulnerable:

Check Wazuh version: if version < 4.11.0, system is vulnerable

Check Version:

wazuh-manager -V | grep 'Wazuh v'

Verify Fix Applied:

Confirm version is 4.11.0 or higher and analysisd is running without crashes

📡 Detection & Monitoring

Log Indicators:

  • analysisd crash logs in /var/ossec/logs/ossec.log
  • Segmentation fault errors in system logs

Network Indicators:

  • Unusual agent communication patterns
  • Multiple connection attempts from single agent

SIEM Query:

source="ossec.log" AND "analysisd" AND ("segmentation fault" OR "crash" OR "abnormal termination")

🔗 References

📤 Share & Export