Thursday, 9 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Fluent Bit vulnerabilities could enable full cloud takeover
Global Market

Fluent Bit vulnerabilities could enable full cloud takeover

Last updated: November 30, 2025 1:23 pm
Published November 30, 2025
Share
Cloud-Security
SHARE

Attackers might flood monitoring programs with false or deceptive occasions, conceal alerts within the noise, and even hijack the telemetry stream solely, Katz stated. The difficulty is now tracked as CVE-2025-12969 and awaits a severity valuation.

Virtually equally troubling are different flaws within the “tag” mechanism, which determines how the data are routed and processed. One bug (CVE-2025-12978) permits an attacker who can guess simply the primary character of the tag key to impersonate trusted tags and reroute logs or bypass filters. One other (CVE-2025-12977) permits unsanitized tag values (together with newlines, directory-traversal strings, and management characters), which might corrupt downstream parsing, allow file-system writes, or permit additional escalation.

Based on the weblog, AWS has secured all of its inner programs that depend on Fluentbit by the Fluentbit mission and launched Fluentbit model 4.1.1. AWS didn’t instantly reply to CSO’s request for remark.

File writes, container overflow, and full agent takeover

Oligo additionally disclosed a sequence of distant code execution (RCE) and path traversal vulnerabilities affecting the device. CVE-2025-12972 targets the “out_file“ output plugin. When Tag values are user-controlled, and no fastened File parameter is ready, attackers can abuse the Tag worth (e.g.,”../“) to trigger path-traversal file writes or overwrites, in the end letting them plant malicious information or achieve RCE.

“Our analysis discovered that a few of these vulnerabilities, corresponding to CVE 2025-12972, have left cloud environments susceptible for over 8 years,” Katz famous.

Within the Docker enter plugin (in-Docker), CVE-2025-12970 reveals a stack buffer overflow. If an attacker names a container with an excessively lengthy identify, the buffer overflow lets them crash the agent or execute code. Oligo warned that the flaw permits attackers to grab the logging agent, conceal their exercise, plant backdoors, and pivot additional into the system.

See also  Seagate: Data Storage Challenges and AI Demands to Define 2025

Source link

TAGGED: Bit, cloud, enable, Fluent, full, takeover, vulnerabilities
Share This Article
Twitter Email Copy Link Print
Previous Article Beyond math and coding: New RL framework helps train LLM agents for complex, real-world tasks Beyond math and coding: New RL framework helps train LLM agents for complex, real-world tasks
Next Article Dycom Buys Power Solutions to Deepen Data Center Capabilities
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

2X Receives Strategic Investment from Insight Partners

2X, a Malvern, PA-based subscription-based advertising as a service (MaaS) firm, acquired a strategic funding…

March 21, 2025

HydroBlok Raises $6M in Extended Series A Funding

Colin Home, CEO HydroBlok HydroBlok, a Draper, UT-based supplier of waterproof development panels for inside…

June 22, 2025

How technology could help battle future fires

Credit score: Pixabay/CC0 Public Area Maxwell Brodie vividly recollects the damaging wildfire he skilled as…

January 22, 2025

Vantage announces €1 bn Dublin campus

Vantage Information Facilities has introduced the event of a multi-phase knowledge centre campus, DUB1. The…

April 25, 2024

Nous Research's NousCoder-14B is an open-source coding model landing right in the Claude Code moment

Nous Research, the open-source synthetic intelligence startup backed by crypto enterprise agency Paradigm, launched a…

January 8, 2026

You Might Also Like

Anthropic keeps new AI model private after it finds thousands of external vulnerabilities
AI

Anthropic keeps new AI model private after it finds thousands of external vulnerabilities

By saad
Stargate comes to the UK, with OpenAI, Nvidia and Nscale
Global Market

OpenAI puts Stargate UK on pause, cites ‘high energy costs’

By saad
open source digital screen
Global Market

New v2 UALink specification aims to catch up to NVLink

By saad
Could being a ‘good neighbour’ help secure grid access?
Global Market

Could being a ‘good neighbour’ help secure grid access?

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.