Buffer Overflow Vulnerability in Packetbeat MongoDB Protocol Parser by Elastic
CVE-2026-0529

6.5MEDIUM

Key Information:

Vendor

Elastic

Vendor
CVE Published:
14 January 2026

What is CVE-2026-0529?

An improper validation of array index in Packetbeat’s MongoDB protocol parser can be exploited by an attacker to trigger buffer overflow conditions. This can occur when specially crafted network traffic is sent to a monitored network interface where MongoDB protocol parsing has been enabled. To mitigate potential exploitation, it is crucial for users to apply the latest updates and follow best security practices.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Packetbeat 7.0.0 <= 7.17.29

Packetbeat 8.0.0 <= 8.19.9

Packetbeat 9.0.0 <= 9.1.9

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

AISLE Research
.