Initiatieven voor
Als nationale autoriteit voor cyberveiligheid heeft het CCB verschillende initiatieven ontwikkeld voor specifieke doelgroepen die hier worden gepresenteerd.
- Last update: 26/11/2025
- Affected software: Fluent Bit
- Type: Remote Code Execution
- CVE/CVSS
→ CVE-2025-12972: CVSS 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
→ CVE-2025-12970: CVSS 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
→ CVE-2025-12978: CVSS 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)
→ CVE-2025-12977: CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
→ CVE-2025-12969: CVSS 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Oligo Research article - https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover
NVD information for CVE-2025-12969 - https://nvd.nist.gov/vuln/detail/CVE-2025-12969
NVD information for CVE-2025-12977 - https://nvd.nist.gov/vuln/detail/CVE-2025-12977
NVD information for CVE-2025-12978 - https://nvd.nist.gov/vuln/detail/CVE-2025-12978
NVD information for CVE-2025-12970 - https://nvd.nist.gov/vuln/detail/CVE-2025-12970
NVD information for CVE-2025-12972 - https://nvd.nist.gov/vuln/detail/CVE-2025-12972
In November 2025, researchers at Oligo together with Amazon AWS disclosed five vulnerabilities in Fluent Bit which could be chained together to achieve remote code execution. Versions of Fluent Bit released since 7 October 2025 are not vulnerable.
Fluent Bit is an open-source tool for collecting, processing, and forwarding logs. This component is massively used in cloud infrastructure; Fluent Bit is embedded in containers and deployed more than 15 billion times. It runs across all major cloud providers and across divers sectors including banks.
While there is no indication of active exploitation at this time (cut-off date: 26 November 2025), it is likely that threat actors would show interest in ways to gain deeper access to Cloud and Kubernetes infrastructure for further compromise, to disrupt cloud services or otherwise tamper with data.
Taken together, the impact of the vulnerability chaining is high for confidentiality, integrity, and availability.
The five vulnerabilities of this chain to achieve remote code execution are:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
In addition to updating to the most recent Fluent Bit release, the following best practices could be used for mitigation:
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.