Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12970: CWE-121: Stack-based Buffer Overflow in FluentBit Fluent Bit

0
High
VulnerabilityCVE-2025-12970cvecve-2025-12970cwe-121
Published: Mon Nov 24 2025 (11/24/2025, 14:39:52 UTC)
Source: CVE Database V5
Vendor/Project: FluentBit
Product: Fluent Bit

Description

The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.

AI-Powered Analysis

AILast updated: 01/07/2026, 19:44:34 UTC

Technical Analysis

CVE-2025-12970 is a stack-based buffer overflow vulnerability identified in the extract_name function within the in_docker input plugin of Fluent Bit, an open-source log processor commonly used in containerized environments. The vulnerability stems from the function copying container names into a fixed-size stack buffer without validating the length of the input. Since container names can be controlled or created by an attacker with the ability to deploy containers, supplying an excessively long container name can overflow the buffer. This overflow can corrupt the stack, potentially allowing an attacker to execute arbitrary code within the Fluent Bit process context or cause a denial of service via process crash. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network, low attack complexity, and requiring only low privileges but no user interaction. The vulnerability affects all versions of Fluent Bit prior to the fix (affectedVersions listed as 0 likely means all prior versions). No patches or exploits are currently publicly available, but the risk is significant given Fluent Bit’s widespread use in cloud-native logging pipelines. Exploitation could lead to compromise of logging infrastructure, data leakage, or disruption of monitoring capabilities.

Potential Impact

For European organizations, this vulnerability poses a serious risk to containerized environments where Fluent Bit is deployed for log aggregation and processing. Successful exploitation could allow attackers to execute arbitrary code, potentially leading to unauthorized access to sensitive log data, manipulation or deletion of logs, and disruption of monitoring systems critical for security and compliance. This can impair incident detection and response capabilities, increasing the risk of undetected breaches. Industries with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, could face regulatory and operational consequences. The vulnerability’s network attack vector and low privilege requirement mean that even internal threat actors or compromised containers could exploit it, increasing the attack surface. Additionally, disruption of logging services could impact forensic investigations and compliance reporting under GDPR and other regulations.

Mitigation Recommendations

European organizations should immediately audit their Fluent Bit deployments to identify affected versions and usage of the in_docker input plugin. Since no official patches are listed yet, temporary mitigations include restricting the ability to create or rename containers with untrusted or excessively long names, enforcing container name length policies at the orchestration or container runtime level. Implement runtime protections such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) to reduce exploitation risk. Monitor container creation events and Fluent Bit logs for anomalous container names or crashes. Consider isolating Fluent Bit processes with minimal privileges and using container security tools to limit lateral movement. Stay alert for vendor patches or updates and apply them promptly once available. Incorporate this vulnerability into incident response plans and threat hunting activities targeting container environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2025-11-10T17:54:00.525Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6929e1b04121026312bb4300

Added to database: 11/28/2025, 5:53:52 PM

Last enriched: 1/7/2026, 7:44:34 PM

Last updated: 1/13/2026, 9:10:10 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats