Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15612: CWE-295 Improper Certificate Validation in Wazuh Wazuh Provisioning Scripts (Agent Build Environment)

0
Medium
VulnerabilityCVE-2025-15612cvecve-2025-15612cwe-295cwe-829
Published: Fri Mar 27 2026 (03/27/2026, 18:16:11 UTC)
Source: CVE Database V5
Vendor/Project: Wazuh
Product: Wazuh Provisioning Scripts (Agent Build Environment)

Description

Wazuh provisioning scripts and Dockerfiles contain an insecure transport vulnerability where curl is invoked with the -k/--insecure flag, disabling SSL/TLS certificate validation. Attackers with network access can perform man-in-the-middle attacks to intercept and modify downloaded dependencies or code during the build process, leading to remote code execution and supply chain compromise.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:01:04 UTC

Technical Analysis

CVE-2025-15612 identifies a security weakness in the Wazuh provisioning scripts and Dockerfiles, specifically within the agent build environment starting from version 4.1.3. The root cause is the use of curl with the -k or --insecure option, which disables SSL/TLS certificate validation during the download of dependencies and code. This improper certificate validation (classified under CWE-295) undermines the trust model of secure communications, allowing attackers positioned on the network path to perform man-in-the-middle (MitM) attacks. Such attackers can intercept, modify, or replace the downloaded content with malicious payloads. Since these provisioning scripts are part of the build environment, compromised downloads can lead to the injection of malicious code into the build artifacts, resulting in remote code execution on target systems and a broader supply chain compromise. The vulnerability does not require any authentication or user interaction but does require the attacker to have network access to the build environment or its traffic. The CVSS 4.0 score is 6.3 (medium), reflecting the moderate ease of exploitation and the limited scope of impact confined to the build environment. No patches or fixes are currently linked, and no active exploitation has been reported. This vulnerability highlights the critical importance of enforcing proper certificate validation in automated build and provisioning processes to maintain supply chain integrity.

Potential Impact

The primary impact of CVE-2025-15612 is the potential for supply chain compromise through the injection of malicious code during the build process of Wazuh agents. Organizations relying on Wazuh for security monitoring and endpoint detection could face remote code execution risks if attackers successfully intercept and alter provisioning scripts or dependencies. This could lead to unauthorized access, data breaches, or disruption of security operations. The compromise of build artifacts can propagate malicious code to multiple endpoints, amplifying the attack's reach and persistence. Additionally, trust in the integrity of security tools like Wazuh could be undermined, affecting incident response and compliance postures. While exploitation requires network access to the build environment, environments with exposed or poorly segmented build infrastructure are at higher risk. The lack of authentication and user interaction requirements lowers barriers for attackers with network presence. Overall, the vulnerability poses a significant risk to organizations using Wazuh in sensitive or large-scale deployments, especially those with complex supply chains and automated build pipelines.

Mitigation Recommendations

To mitigate CVE-2025-15612, organizations should immediately audit and update their Wazuh provisioning scripts and Dockerfiles to remove the use of the curl -k/--insecure flag, ensuring that SSL/TLS certificate validation is enforced for all downloads. Implement strict certificate pinning or use trusted certificate authorities to validate server certificates during dependency retrieval. Network segmentation should be applied to isolate build environments from untrusted networks, reducing the risk of MitM attacks. Employ secure build environments with encrypted and authenticated channels (e.g., VPNs or private networks) to protect provisioning traffic. Regularly verify the integrity of downloaded dependencies using cryptographic hashes or signatures. Monitor network traffic for unusual interception or modification attempts. Additionally, consider integrating supply chain security tools that scan for tampered or malicious code in build artifacts. Stay updated with Wazuh vendor advisories for patches or official fixes and apply them promptly once available. Finally, conduct security awareness and training for DevOps teams to recognize and avoid insecure scripting practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-20T16:24:45.413Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6d01e3c064ed76fe28e04

Added to database: 3/27/2026, 6:44:46 PM

Last enriched: 3/27/2026, 7:01:04 PM

Last updated: 3/28/2026, 1:15:51 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses