CVE-2025-15615: CWE-276 Incorrect Default Permissions in Wazuh wazuh-manager
CVE-2025-15615 is a medium-severity vulnerability in Wazuh Manager's authd service (versions up to 4. 7. 3) involving improper restriction of client-initiated SSL/TLS renegotiation. Remote attackers can exploit this flaw by sending excessive renegotiation requests, causing a denial of service (DoS) through CPU resource exhaustion. The vulnerability does not require authentication or user interaction and affects the availability of the authd service. No known exploits are currently reported in the wild. Organizations using vulnerable versions of wazuh-manager should prioritize patching or applying mitigations to prevent service disruption. This vulnerability is particularly relevant to entities relying on Wazuh for security monitoring and incident response. Countries with significant Wazuh deployments and critical infrastructure monitoring are at higher risk. The CVSS 4.
AI Analysis
Technical Summary
CVE-2025-15615 is a vulnerability identified in the Wazuh Manager's authd service, specifically in wazuh-manager packages up to version 4.7.3. The flaw arises from improper restriction of client-initiated SSL/TLS renegotiation, allowing remote attackers to repeatedly request renegotiation without limits. This excessive renegotiation consumes significant CPU resources on the server, leading to denial of service by making the authd service unavailable. The vulnerability is rooted in CWE-276, which concerns incorrect default permissions or restrictions, here manifesting as a failure to limit renegotiation attempts. Exploitation requires no authentication or user interaction, making it accessible to any remote attacker with network access to the service. The vulnerability affects the availability of the service but does not compromise confidentiality or integrity. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), no impact on confidentiality or integrity (VC:N/VI:N), limited impact on availability (VA:L), no scope change (SC:N), no impact on integrity (SI:N), and low scope attack (SA:L). This vulnerability is significant for organizations using Wazuh for security monitoring, as disruption of the authd service can impair alerting and incident response capabilities.
Potential Impact
The primary impact of CVE-2025-15615 is denial of service against the Wazuh Manager authd service, which is critical for managing agent authentication and communication. Successful exploitation can render the authd service unavailable, disrupting the ability of Wazuh agents to communicate with the manager, potentially causing gaps in security monitoring and incident detection. This can delay threat detection and response, increasing organizational risk. Since Wazuh is widely used for security information and event management (SIEM) and endpoint monitoring, affected organizations may experience degraded security posture and operational interruptions. The vulnerability does not expose sensitive data or allow unauthorized access, but the availability impact can be severe in environments relying heavily on continuous monitoring. The ease of exploitation and lack of required privileges increase the risk of opportunistic attacks, especially in exposed network environments. No known exploits in the wild reduce immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-15615, organizations should upgrade wazuh-manager to a version later than 4.7.3 once patches are released by the vendor. In the absence of an official patch, administrators can implement network-level controls to restrict access to the authd service, such as firewall rules limiting connections to trusted IP addresses only. Monitoring network traffic for abnormal SSL/TLS renegotiation patterns can help detect attempted exploitation. Rate limiting or connection throttling at the network or application layer may reduce the impact of excessive renegotiation requests. Additionally, deploying intrusion prevention systems (IPS) with signatures targeting SSL/TLS renegotiation abuse can provide proactive defense. Regularly reviewing Wazuh logs for service disruptions and anomalous authentication behavior is recommended. Organizations should also ensure that Wazuh Manager is deployed behind secure network boundaries and not exposed directly to untrusted networks. Finally, maintaining an incident response plan that includes recovery from DoS conditions will help minimize operational impact.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, Brazil
CVE-2025-15615: CWE-276 Incorrect Default Permissions in Wazuh wazuh-manager
Description
CVE-2025-15615 is a medium-severity vulnerability in Wazuh Manager's authd service (versions up to 4. 7. 3) involving improper restriction of client-initiated SSL/TLS renegotiation. Remote attackers can exploit this flaw by sending excessive renegotiation requests, causing a denial of service (DoS) through CPU resource exhaustion. The vulnerability does not require authentication or user interaction and affects the availability of the authd service. No known exploits are currently reported in the wild. Organizations using vulnerable versions of wazuh-manager should prioritize patching or applying mitigations to prevent service disruption. This vulnerability is particularly relevant to entities relying on Wazuh for security monitoring and incident response. Countries with significant Wazuh deployments and critical infrastructure monitoring are at higher risk. The CVSS 4.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15615 is a vulnerability identified in the Wazuh Manager's authd service, specifically in wazuh-manager packages up to version 4.7.3. The flaw arises from improper restriction of client-initiated SSL/TLS renegotiation, allowing remote attackers to repeatedly request renegotiation without limits. This excessive renegotiation consumes significant CPU resources on the server, leading to denial of service by making the authd service unavailable. The vulnerability is rooted in CWE-276, which concerns incorrect default permissions or restrictions, here manifesting as a failure to limit renegotiation attempts. Exploitation requires no authentication or user interaction, making it accessible to any remote attacker with network access to the service. The vulnerability affects the availability of the service but does not compromise confidentiality or integrity. No patches were linked at the time of reporting, and no known exploits have been observed in the wild. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), no impact on confidentiality or integrity (VC:N/VI:N), limited impact on availability (VA:L), no scope change (SC:N), no impact on integrity (SI:N), and low scope attack (SA:L). This vulnerability is significant for organizations using Wazuh for security monitoring, as disruption of the authd service can impair alerting and incident response capabilities.
Potential Impact
The primary impact of CVE-2025-15615 is denial of service against the Wazuh Manager authd service, which is critical for managing agent authentication and communication. Successful exploitation can render the authd service unavailable, disrupting the ability of Wazuh agents to communicate with the manager, potentially causing gaps in security monitoring and incident detection. This can delay threat detection and response, increasing organizational risk. Since Wazuh is widely used for security information and event management (SIEM) and endpoint monitoring, affected organizations may experience degraded security posture and operational interruptions. The vulnerability does not expose sensitive data or allow unauthorized access, but the availability impact can be severe in environments relying heavily on continuous monitoring. The ease of exploitation and lack of required privileges increase the risk of opportunistic attacks, especially in exposed network environments. No known exploits in the wild reduce immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-15615, organizations should upgrade wazuh-manager to a version later than 4.7.3 once patches are released by the vendor. In the absence of an official patch, administrators can implement network-level controls to restrict access to the authd service, such as firewall rules limiting connections to trusted IP addresses only. Monitoring network traffic for abnormal SSL/TLS renegotiation patterns can help detect attempted exploitation. Rate limiting or connection throttling at the network or application layer may reduce the impact of excessive renegotiation requests. Additionally, deploying intrusion prevention systems (IPS) with signatures targeting SSL/TLS renegotiation abuse can provide proactive defense. Regularly reviewing Wazuh logs for service disruptions and anomalous authentication behavior is recommended. Organizations should also ensure that Wazuh Manager is deployed behind secure network boundaries and not exposed directly to untrusted networks. Finally, maintaining an incident response plan that includes recovery from DoS conditions will help minimize operational impact.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-27T16:20:48.688Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c6c5913c064ed76fdb1789
Added to database: 3/27/2026, 5:59:45 PM
Last enriched: 3/27/2026, 6:11:36 PM
Last updated: 3/27/2026, 7:07:41 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.