Fluent Bit, a widely used logging utility, has a critical vulnerability. This vulnerability can lead to denial-of-service attacks, information disclosure, and potentially remote code execution (RCE). Tenable, a cybersecurity firm, discovered this vulnerability.
Fluent Bit is an open source tool that collects and processes large amounts of log data from various sources. It has billions of downloads and is being deployed over 10 million times daily.
By infosecbulletin
/ Wednesday , June 4 2025
IBM has issued a security advisory for vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms. These...
Read More
By infosecbulletin
/ Wednesday , June 4 2025
As Bangladesh prepares for the extended Eid-ul-Adha holidays, the BGD e-GOV Computer Incident Response Team (CIRT) has issued an urgent...
Read More
By infosecbulletin
/ Tuesday , June 3 2025
In March 2025, the Threatfabric mobile Threat Intelligence team identified Crocodilus, a new Android banking Trojan designed for device takeover....
Read More
By infosecbulletin
/ Tuesday , June 3 2025
Qualcomm has issued security patches for three zero-day vulnerabilities in the Adreno GPU driver, affecting many chipsets that are being...
Read More
By infosecbulletin
/ Monday , June 2 2025
Roundcube Webmail has fixed a critical security flaw that could enable remote code execution after authentication. Disclosed by security researcher...
Read More
By infosecbulletin
/ Sunday , June 1 2025
A hacker known as "303" claim to breach the company's systems and leaked sensitive internal data on a dark web...
Read More
By infosecbulletin
/ Sunday , June 1 2025
CISA and ACSC issued new guidance this week on how to procure, implement, and maintain SIEM and SOAR platforms. SIEM...
Read More
By infosecbulletin
/ Saturday , May 31 2025
The Qualys Threat Research Unit (TRU) found two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities....
Read More
By infosecbulletin
/ Saturday , May 31 2025
New ransomware payment reporting rules take effect in Australia yesterday (May 30) for all organisations with an annual turnover of...
Read More
By infosecbulletin
/ Saturday , May 31 2025
Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require...
Read More
Developers claim it’s used by big cloud companies like Microsoft, Google Cloud, and AWS, as well as tech giants like Cisco, LinkedIn, VMware, Splunk, Intel, Arm, and Adobe.
Tenable researchers discovered a critical memory corruption vulnerability in Fluent Bit’s built-in HTTP server. The vulnerability is named Linguistic Lumberjack and has been assigned the official identifier CVE-2024-4323.
The cybersecurity firm confirmed that if someone has access to the Fluent Bit monitoring API, they can launch a DoS attack or obtain sensitive information.
Exploiting CVE-2024-4323 for RCE may be possible, but it depends on factors like the operating system and host architecture.
“While heap buffer overflows such as this are known to be exploitable, creating a reliable exploit is not only difficult, but incredibly time intensive,” Tenable explained.
On Monday, the company released technical information and a proof-of-concept (PoC) exploit for DoS attacks.
Tenable shared its findings with Fluent Bit developers in April, but the patch has not been officially released yet. The security firm also informed Microsoft, AWS, and Google Cloud about the findings on May 15th.
Users can implement mitigations for Fluent Bit by restricting access to the tool’s API and disabling any unused endpoints.