Elastic Beats metricbeat 8.0.x < 8.19.13 / 9.0.x < 9.2.5 DoS (ESA-2026-09)

medium Nessus Plugin ID 303930

Synopsis

Elastic Beats metricbeat installed on the remote Windows host is affected by a denial of service vulnerability.

Description

The version of Elastic Beats metricbeat installed on the remote host is 8.0.x prior to 8.19.13, 9.0.x prior to 9.2.5. It is, therefore, affected by a denial of service vulnerability.

- Memory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_write HTTP handler in Metricbeat can lead Denial of Service via Excessive Allocation (CAPEC-130). (CVE-2026-26931)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Elastic Beats metricbeat version 8.19.13, 9.2.5 or later.

See Also

http://www.nessus.org/u?ae5abf14

Plugin Details

Severity: Medium

ID: 303930

File Name: elastic_beats_metricbeat_ESA-2026-09.nasl

Version: 1.1

Type: local

Agent: windows

Family: Windows

Published: 3/27/2026

Updated: 3/27/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v3

Risk Factor: Medium

Base Score: 5.7

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS Score Source: CVE-2026-26931

Vulnerability Information

CPE: x-cpe:/a:elastic:beats_metricbeat

Required KB Items: SMB/Registry/Enumerated, installed_sw/Beats metricbeat

Patch Publication Date: 3/19/2026

Vulnerability Publication Date: 3/19/2026

Reference Information

CVE: CVE-2026-26931

IAVA: 2026-A-0265