CVE-2025-64483

N/A Unknown

📋 TL;DR

This vulnerability allows authenticated users with read-only API roles in Wazuh to retrieve agent enrollment credentials through the /utils/configuration endpoint. These credentials can then be used to register unauthorized agents within the same Wazuh tenant. Organizations running Wazuh versions 4.9.0 through 4.12.x with API access configured are affected.

💻 Affected Systems

Products:
  • Wazuh
Versions: 4.9.0 to 4.12.x
Operating Systems: All platforms running Wazuh
Default Config Vulnerable: ✅ No
Notes: Only affects deployments where API access is enabled and users have read-only API roles. The vulnerability requires authenticated access to the API endpoint.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with read-only API access could register malicious agents that exfiltrate sensitive security data, manipulate alerts, or disrupt monitoring operations across the entire Wazuh deployment.

🟠

Likely Case

Internal users with read-only API permissions could unintentionally or intentionally register unauthorized agents, potentially causing configuration drift, alert fatigue, or data integrity issues.

🟢

If Mitigated

With proper API access controls and network segmentation, the impact is limited to potential unauthorized agent registrations that can be detected and remediated through existing monitoring.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid API credentials with read-only permissions. The attack involves a simple API call to retrieve credentials followed by agent registration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.13.0

Vendor Advisory: https://github.com/wazuh/wazuh-dashboard-plugins/security/advisories/GHSA-gwf3-8gm3-qrmj

Restart Required: Yes

Instructions:

1. Backup current Wazuh configuration. 2. Upgrade Wazuh to version 4.13.0 or later. 3. Restart Wazuh services. 4. Verify the fix by testing API endpoint access.

🔧 Temporary Workarounds

Restrict API Access

linux

Temporarily restrict access to the /utils/configuration endpoint or disable API access for read-only users.

# Modify Wazuh API configuration to restrict endpoint access
# Edit /var/ossec/api/configuration/api.yaml and adjust permissions

Network Segmentation

linux

Implement network controls to restrict API access to trusted IP addresses only.

# Example iptables rule to restrict API access
iptables -A INPUT -p tcp --dport 55000 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 55000 -j DROP

🧯 If You Can't Patch

  • Implement strict API access controls and audit all read-only user activities
  • Monitor agent registration logs for unauthorized or suspicious enrollment attempts

🔍 How to Verify

Check if Vulnerable:

Check if Wazuh version is between 4.9.0 and 4.12.x and API access is enabled with read-only users.

Check Version:

wazuh-manager -v

Verify Fix Applied:

After upgrading to 4.13.0+, verify that read-only API users cannot access agent enrollment credentials through /utils/configuration endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /utils/configuration endpoint
  • Unexpected agent registration events
  • Multiple agent enrollments from single user

Network Indicators:

  • Unusual API traffic patterns to configuration endpoints
  • Agent registration requests from non-standard sources

SIEM Query:

source="wazuh-api" AND (endpoint="/utils/configuration" OR event="agent_enrollment") | stats count by user, src_ip

🔗 References

📤 Share & Export