Fluent Bit Memory Corruption Vulnerability Could Lead to Denial of Service, Information Disclosure, or Remote Code Execution
CVE-2024-4323
Key Information:
- Vendor
Fluent Bit
- Status
- Vendor
- CVE Published:
- 20 May 2024
Badges
What is CVE-2024-4323?
A critical vulnerability, known as CVE-2024-4323, has been identified in Fluent Bit versions 2.0.7 thru 3.0.3, which may result in memory corruption leading to denial of service, information disclosure, or remote code execution. The vulnerability affects major cloud providers' offerings and the tech companies using them, but researchers state that exploiting the vulnerability for remote code execution is much harder. Tenable researchers have confirmed that the vulnerability has been exploited. The issue has been addressed in Fluent Bit v3.0.4, which companies are advised to upgrade to, or to ensure that access to Fluent Bit’s monitoring API is given only to authorized users and services. The affected cloud providers have been notified in order to initiate their internal triage processes.
Affected Version(s)
Fluent Bit 2.0.7 <= 3.0.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Memory corruption flaw in Fluent Bit could disrupt cloud platforms
Security pros warn that a bug in the popular open-source logging and metrics tool could cause denial-of-service attacks and data loss in all the major cloud platforms, including AWS, GCP and Azure.
Alleged Incognito Market operator arrested. OmniVision discloses data breach. Critical flaw affects Fluent Bit.
Alleged Incognito Market operator arrested. OmniVision discloses data breach. Critical flaw affects Fluent Bit.
Critical Fluent Bit bug affects all major cloud providers
Infosec researchers are alerting the industry to a critical vulnerability in Fluent Bit – a logging component used by a swathe of blue chip companies and all three major cloud providers. Experts at Tenable...
References
EPSS Score
84% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📰
First article discovered by Tenable
Vulnerability published
