CVE-2026-26931: Denial of Service via Decompression Bomb in Elastic Metricbeat Prometheus remote_write
Vulnerability ID: CVE-2026-26931
CVSS Score: 5.7
Published: 2026-03-19
Elastic Metricbeat is vulnerable to an unauthenticated Denial of Service (DoS) attack via a memory exhaustion flaw in the Prometheus remote_write HTTP handler. The vulnerability stems from insufficient validation of declared uncompressed sizes within Snappy-compressed payloads, allowing an attacker to trigger an Out-of-Memory (OOM) process termination.
TL;DR
A CWE-789 vulnerability in Elastic Metricbeat's Prometheus remote_write module allows network attackers to crash the service. Sending a crafted Snappy payload with a spoofed decompressed size forces the process to allocate excessive memory, triggering the OOM killer.
Technical Details
- CWE ID: CWE-789
- Attack Vector: Adjacent Network (AV:A)
- CVSS Score: 5.7 (Medium)
- Impact: Denial of Service (OOM Process Crash)
- Exploit Status: Unexploited
- CISA KEV: Not Listed
Affected Systems
- Elastic Metricbeat (Prometheus remote_write module)
-
Metricbeat: 8.0.0 <= v <= 8.19.12 (Fixed in:
8.19.13) -
Metricbeat: 9.0.0 <= v <= 9.2.4 (Fixed in:
9.2.5)
Code Analysis
Commit: de072c4
Add configuration to limit remote_write payload sizes and validate Snappy decompression size.
Mitigation Strategies
- Upgrade Elastic Metricbeat to the designated patched versions.
- Disable the Prometheus remote_write module if not actively used.
- Implement network access controls restricting connections to port 9201.
Remediation Steps:
- Identify all deployed Metricbeat instances utilizing the prometheus module and remote_write metricset.
- Upgrade the Metricbeat binary to version 8.19.13 (for 8.x deployments) or 9.2.5 (for 9.x deployments).
- Review the new configuration parameters
max_compressed_body_bytesandmax_decoded_body_bytesto ensure they accommodate existing telemetry volumes. - Restart the Metricbeat service to apply the updated binary and configuration.
References
- Elastic Security Advisory (ESA-2026-09)
- CVE.org Record for CVE-2026-26931
- Fix Commit (de072c4e371eafeb2a42d65b9ad513f666e4ffd7)
Read the full report for CVE-2026-26931 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)