Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elastic
Elastic packetbeat |
|
| Vendors & Products |
Elastic
Elastic packetbeat |
Thu, 26 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port. | |
| Title | Improper Validation of Array Index in Packetbeat Leading to Denial of Service | |
| Weaknesses | CWE-129 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2026-02-26T18:28:12.222Z
Reserved: 2026-02-16T16:42:05.773Z
Link: CVE-2026-26932
No data.
Status : Received
Published: 2026-02-26T18:23:07.470
Modified: 2026-02-26T18:23:07.470
Link: CVE-2026-26932
No data.
OpenCVE Enrichment
Updated: 2026-02-27T09:07:23Z
Weaknesses