CVE-2025-65942

2.7 LOW

📋 TL;DR

VictoriaMetrics versions 1.0.0-1.110.22, 1.111.0-1.122.7, and 1.123.0-1.129.0 are vulnerable to denial-of-service attacks where malformed snappy-compressed blocks bypass request size limits, causing excessive memory consumption and potential service crashes. This affects all deployments using vulnerable versions of VictoriaMetrics for time series monitoring.

💻 Affected Systems

Products:
  • VictoriaMetrics
Versions: 1.0.0 to 1.110.22, 1.111.0 to 1.122.7, 1.123.0 to 1.129.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions with snappy compression enabled are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage due to out-of-memory errors, disrupting monitoring capabilities and potentially affecting dependent systems.

🟠

Likely Case

Service instability with intermittent crashes or degraded performance during attacks.

🟢

If Mitigated

Minimal impact with proper request filtering and resource limits in place.

🌐 Internet-Facing: MEDIUM - Attackers can exploit this remotely, but requires sending specific malformed requests.
🏢 Internal Only: LOW - Internal users could exploit, but typically have legitimate access and less motivation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires crafting malformed snappy-compressed blocks but no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.110.23, 1.122.8, or 1.129.1

Vendor Advisory: https://github.com/VictoriaMetrics/VictoriaMetrics/security/advisories/GHSA-66jq-2c23-2xh5

Restart Required: Yes

Instructions:

1. Identify current VictoriaMetrics version. 2. Upgrade to patched version (1.110.23, 1.122.8, or 1.129.1). 3. Restart VictoriaMetrics service. 4. Verify fix with version check.

🔧 Temporary Workarounds

Rate Limiting

all

Implement request rate limiting to reduce impact of DoS attempts.

# Use reverse proxy like nginx with rate limiting
limit_req_zone $binary_remote_addr zone=vm_zone:10m rate=10r/s;
limit_req zone=vm_zone burst=20 nodelay;

Memory Limits

linux

Set strict memory limits on VictoriaMetrics container/process.

# For Docker
docker run --memory=2g victoriametrics/victoria-metrics
# For systemd
MemoryMax=2G in service file

🧯 If You Can't Patch

  • Implement network-level filtering to block malformed requests at load balancer or firewall.
  • Deploy VictoriaMetrics behind a WAF with DoS protection rules.

🔍 How to Verify

Check if Vulnerable:

Check VictoriaMetrics version against affected ranges: 1.0.0-1.110.22, 1.111.0-1.122.7, or 1.123.0-1.129.0.

Check Version:

curl -s http://localhost:8428/metrics | grep -i victoriametrics_version

Verify Fix Applied:

Confirm version is 1.110.23+, 1.122.8+, or 1.129.1+ and monitor for memory spikes from snappy requests.

📡 Detection & Monitoring

Log Indicators:

  • Out of memory errors in logs
  • Unexpected process termination
  • High memory usage spikes

Network Indicators:

  • Unusually large or malformed requests to VictoriaMetrics endpoints
  • Multiple rapid requests with snappy encoding

SIEM Query:

source="victoriametrics.log" AND ("OOM" OR "out of memory" OR "panic")

🔗 References

📤 Share & Export