{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12970","assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","state":"PUBLISHED","assignerShortName":"certcc","dateReserved":"2025-11-10T17:54:00.525Z","datePublished":"2025-11-24T14:39:52.569Z","dateUpdated":"2026-01-07T15:36:41.505Z"},"containers":{"cna":{"title":"CVE-2025-12970","descriptions":[{"lang":"en","value":"The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution."}],"source":{"discovery":"UNKNOWN"},"affected":[{"vendor":"FluentBit","product":"Fluent Bit","versions":[{"status":"affected","version":"0","lessThan":"4.0.12","versionType":"custom"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-121: Stack-based Buffer Overflow"}]}],"references":[{"url":"https://fluentbit.io/blog/2025/10/28/security-vulnerabilities-addressed-in-fluent-bit-v4.1-and-backported-to-v4.0/"},{"url":"https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover"}],"x_generator":{"engine":"VINCE 3.0.31","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2025-12970"},"providerMetadata":{"orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc","dateUpdated":"2026-01-07T15:36:41.505Z"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-11-24T16:59:58.423891Z","id":"CVE-2025-12970","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-24T17:00:03.177Z"}}]}}