Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-26455: n/a

0
High
VulnerabilityCVE-2024-26455cvecve-2024-26455
Published: Mon Feb 26 2024 (02/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

fluent-bit 2.2.2 contains a Use-After-Free vulnerability in /fluent-bit/plugins/custom_calyptia/calyptia.c.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:54:23 UTC

Technical Analysis

CVE-2024-26455 is a Use-After-Free (CWE-416) vulnerability identified in fluent-bit version 2.2.2, specifically within the /fluent-bit/plugins/custom_calyptia/calyptia.c source code. Use-After-Free vulnerabilities occur when a program continues to use memory after it has been freed, leading to undefined behavior such as crashes or potential code execution. In this case, the vulnerability allows remote attackers to cause a denial of service by triggering a crash in the fluent-bit logging agent without requiring any privileges or user interaction. The vulnerability is remotely exploitable over the network (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. Although no public exploits have been reported yet, the vulnerability poses a significant risk to systems running the affected version of fluent-bit, especially in environments relying on the custom_calyptia plugin for log processing. Fluent-bit is widely used in cloud-native environments for log forwarding and processing, making this vulnerability relevant for many organizations. The absence of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for mitigation and monitoring.

Potential Impact

The primary impact of CVE-2024-26455 is denial of service due to a crash in the fluent-bit logging agent, which can disrupt log collection and processing pipelines. This disruption can hinder incident response, monitoring, and auditing capabilities, potentially delaying detection of other security incidents. Organizations relying on fluent-bit for centralized logging, especially in cloud-native or containerized environments, may experience service interruptions affecting operational visibility. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects on security posture and compliance. Attackers can exploit this vulnerability remotely without authentication or user interaction, increasing the risk of widespread exploitation. The lack of known exploits in the wild currently reduces immediate threat but does not eliminate the risk, especially as exploit code may be developed and released in the future. Overall, the vulnerability poses a high risk to availability and operational continuity for organizations using the affected fluent-bit version and plugin.

Mitigation Recommendations

1. Immediately assess whether the custom_calyptia plugin is in use; if not, disable or remove it to eliminate the attack surface. 2. Monitor official fluent-bit repositories and security advisories closely for the release of patches addressing CVE-2024-26455 and apply updates promptly once available. 3. Implement network-level protections such as firewall rules or segmentation to restrict access to fluent-bit agents, limiting exposure to untrusted networks. 4. Employ runtime monitoring and anomaly detection to identify unusual crashes or restarts of fluent-bit services, enabling rapid incident response. 5. Consider deploying redundant logging agents or failover mechanisms to maintain log availability in case of service disruption. 6. Review and harden the configuration of fluent-bit to minimize unnecessary plugin usage and reduce attack surface. 7. Engage with vendors or community support channels for guidance and potential workarounds until patches are released. These steps go beyond generic advice by focusing on plugin-specific mitigation, proactive monitoring, and network-level controls tailored to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d75b7ef31ef0b57259e

Added to database: 2/25/2026, 9:45:25 PM

Last enriched: 2/26/2026, 10:54:23 AM

Last updated: 4/12/2026, 3:38:19 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses