By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Tech News

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

By Viral Trending Content 4 Min Read
Share
SHARE

Nov 24, 2025Ravie LakshmananVulnerability / Container Security

Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures.

The security defects “allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags,” Oligo Security said in a report shared with The Hacker News.

DFIR Retainer Services

Successful exploitation of the flaws could enable attackers to disrupt cloud services, manipulate data, and burrow deeper into cloud and Kubernetes infrastructure. The list of identified vulnerabilities is as follows –

  • CVE-2025-12972 – A path traversal vulnerability stemming from the use of unsanitized tag values to generate output filenames, making it possible to write or overwrite arbitrary files on disk, enabling log tampering and remote code execution.
  • CVE-2025-12970 – A stack buffer overflow vulnerability in the Docker Metrics input plugin (in_docker) that could allow attackers to trigger code execution or crash the agent by creating containers with excessively long names.
  • CVE-2025-12978 – A vulnerability in the tag-matching logic lets attackers spoof trusted tags – which are assigned to every event ingested by Fluent Bit – by guessing only the first character of a Tag_Key, allowing an attacker to reroute logs, bypass filters, and inject malicious or misleading records under trusted tags.
  • CVE-2025-12977 – An improper input validation of tags derived from user-controlled fields, allowing an attacker to inject newlines, traversal sequences, and control characters that can corrupt downstream logs.
  • CVE-2025-12969 – A missing security.users authentication in the in_forward plugin that’s used to receive logs from other Fluent Bit instances using the Forward protocol, allowing attackers to send logs, inject false telemetry, and flood a security product’s logs with false events.

“The amount of control enabled by this class of vulnerabilities could allow an attacker to breach deeper into a cloud environment to execute malicious code through Fluent Bit, while dictating which events are recorded, erasing or rewriting incriminating entries to hide their tracks after an attack, injecting fake telemetry, and injecting plausible fake events to mislead responders,” researchers said.

The CERT Coordination Center (CERT/CC), in an independent advisory, said many of these vulnerabilities require an attacker to have network access to a Fluent Bit instance, adding they could be used for authentication bypass, remote code execution, service disruption, and tag manipulation.

Following responsible disclosure, the issues have been addressed in versions 4.1.1 and 4.0.12 released last month. Amazon Web Services (AWS), which also engaged in coordinated disclosure, has urged customers running Fluentbit to update to the latest version for optimal protection.

CIS Build Kits

Given Fluent Bit’s popularity within enterprise environments, the shortcomings have the potential to impair access to cloud services, allow data tampering, and seize control of the logging service itself.

Other recommended actions include avoiding use of dynamic tags for routing, locking down output paths and destinations to prevent tag-based path expansion or traversal, mounting /fluent-bit/etc/ and configuration files as read-only to block runtime tampering, and running the service as non-root users.

The development comes more than a year after Tenable detailed a flaw in Fluent Bit’s built-in HTTP server (CVE-2024-4323 aka Linguistic Lumberjack) that could be exploited to achieve denial-of-service (DoS), information disclosure, or remote code execution.

You Might Also Like

Best Fitness Tracker 2026: Fitbits, Bands & Hybrids

Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That

Critical Fortinet Forticlient EMS flaw now exploited in attacks

21 organisations currently adding to their engineering teams

M5 Ultra Mac Studio Leaks: 8K Video and GPU Benchmarks

TAGGED: Cloud security, Container Security, Cyber Security, Cybersecurity, Internet, Kubernetes, Remote Code Execution, threat detection, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Germany’s family business lobby opens door to AfD, sparking backlash
Next Article TruthScan vs. Sapling: Which Can Detect AI Writing Better?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Qatar and Ukraine sign defence agreement as Zelenskyy’s Gulf tour shapes new partnerships
World News
Hyperliquid Goes To University — This Study Is Now Required Reading For Traders
Crypto
“Stand Ready for My Arrival, Worm”: Invincible VS Adds Conquest as Final Launch Fighter
Gaming News
As the Iran war drags on, ‘shell-shocked’ CEOs may soon break their silence on Trump
Business
XRP price outlook: relief bounce driven by Ripple CEO optimism
Crypto
Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked
Gaming News
Brush up: How to plan a creative holiday in Europe
Travel

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Qatar and Ukraine sign defence agreement as Zelenskyy’s Gulf tour shapes new partnerships

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Qatar and Ukraine sign defence agreement as Zelenskyy’s Gulf tour shapes new partnerships
March 30, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?