CVE-2026-33459
MEDIUM
6,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
Description
AI Translation Available
Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Allocation (CAPEC-130). An authenticated user with access to the automatic import feature can submit specially crafted requests with excessively large input values. When multiple such requests are sent concurrently, the backend services become unstable, resulting in service disruption and deployment unavailability for all users.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0004
Percentile
0,1th
Updated
EPSS Score Trend (Last 8 Days)
400
Uncontrolled Resource Consumption
DraftCommon Consequences
Security Scopes Affected:
Availability
Access Control
Other
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Other)
Bypass Protection Mechanism
Other
Applicable Platforms
All platforms may be affected
Application
Kibana by Elastic
Version Range Affected
From
9.0.0
(inclusive)
To
9.2.8
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Kibana by Elastic
Version Range Affected
From
8.15.0
(inclusive)
To
8.19.14
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Kibana by Elastic
Version Range Affected
From
9.3.0
(inclusive)
To
9.3.3
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://discuss.elastic.co/t/kibana-8-19-14-9-2-8-9-3-3-security-update-esa-202…