Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Learn how to identify risks and safely patch using community-maintained tools

RomCom uses SocGholish fake update attack to deliver Mythic Agent malware

How the Netherlands built a big tent for cellular agriculture

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Fluent Bit flaw exposes cloud to RCE and stealth infrastructure intrusions
Identity

New Fluent Bit flaw exposes cloud to RCE and stealth infrastructure intrusions

userBy userNovember 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 24, 2025Ravi LakshmananVulnerabilities / Container Security

Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source lightweight telemetry agent. These can cascade to compromise and take over cloud infrastructure.

Oligo Security said in a report shared with The Hacker News that the security flaw “allows an attacker to bypass authentication, perform path traversal, remotely execute code, cause a denial of service condition, and manipulate tags.”

DFIR retainer service

Successful exploitation of this flaw could allow attackers to disrupt cloud services, manipulate data, and penetrate deeper into cloud and Kubernetes infrastructure. The list of identified vulnerabilities is as follows:

CVE-2025-12972 – Path traversal vulnerability due to use of unsanitized tag values ​​to generate output file names. This allows the attacker to write or overwrite arbitrary files on disk, allowing for log tampering and remote code execution. CVE-2025-12970 – A stack buffer overflow vulnerability in the Docker Metrics input plugin (in_docker) could allow an attacker to create a container with an overly long name to trigger code execution or crash the agent. CVE-2025-12978 – A vulnerability in the tag matching logic allows an attacker to spoof the trusted tag assigned to all events ingested by Fluent Bit by guessing only the first character of the Tag_Key, allowing the attacker to reroute logs, bypass filters, and inject malicious or misleading records under the trusted tag. CVE-2025-12977 – Improper input validation for tags derived from user control fields allows attackers to insert line breaks, traversal sequences, and control characters that can corrupt downstream logs. CVE-2025-12969 – Missing security.users authentication in the in_forward plugin, which is used to receive logs from other Fluent Bit instances using the Forward protocol, allows attackers to send logs, inject fake telemetry, and flood security products’ logs with bogus events.

“The amount of control allowed by this class of vulnerabilities allows attackers to penetrate deeper into cloud environments and use Fluent Bit “It may be possible to execute malicious code via an attacker, while dictating which events are logged, erasing or rewriting incriminating entries to cover their tracks after an attack, or injecting fake telemetry or plausibly false events to mislead responders,” the researchers said.

The CERT Coordination Center (CERT/CC) said in an independent advisory that many of these vulnerabilities require an attacker to have network access to the Fluent Bit instance, adding that they could be used for authentication bypass, remote code execution, service interruption, and tag manipulation.

Following responsible disclosure, this issue was resolved in versions 4.1.1 and 4.0.12 released last month. Amazon Web Services (AWS) is also engaging in coordinated disclosure, urging customers running Fluentbit to update to the latest version for optimal protection.

CIS build kit

Given Fluent Bit’s popularity within corporate environments, this shortcoming could compromise access to cloud services, allow data tampering, and take control of the logging service itself.

Other recommended actions include avoiding the use of dynamic tags for routing, locking down output paths and destinations to prevent tag-based path expansion or traversal, mounting /fluent-bit/etc/ and configuration files as read-only to block runtime tampering, and running services as a non-root user.

This development comes more than a year after Tenable detailed a flaw in Fluent Bit’s built-in HTTP server (CVE-2024-4323 aka Linguistic Lumberjack) that, if exploited, could lead to a denial of service (DoS), information disclosure, or remote code execution.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNeanderthals cannibalized ‘outsider’ women and children in Belgian caves 45,000 years ago
Next Article Former MrBeast content strategist is building AI tools for creator ideation and analysis
user
  • Website

Related Posts

Learn how to identify risks and safely patch using community-maintained tools

November 26, 2025

RomCom uses SocGholish fake update attack to deliver Mythic Agent malware

November 26, 2025

Researchers point to increase in AI phishing and holiday scams, FBI reports $262 million in ATO fraud

November 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Learn how to identify risks and safely patch using community-maintained tools

RomCom uses SocGholish fake update attack to deliver Mythic Agent malware

How the Netherlands built a big tent for cellular agriculture

Discuss Australia’s future relationship with Horizon Europe

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.