ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Wazuh is a free and open-source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh, with over 10 million downloads per year, has one of the largest open-source security communities in the world. Wazuh helps organizations of all sizes protect their data assets against security threats. Learn more about the project at wazuh.com

Wazuh A.I CyberSecurity Scoring

Wazuh

Company Details

Linkedin ID:

wazuh

Employees number:

259

Number of followers:

71,485

NAICS:

541514

Industry Type:

Computer and Network Security

Homepage:

wazuh.com

IP Addresses:

Scan still pending

Company ID:

WAZ_2382209

Scan Status:

In-progress

AI scoreWazuh Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/wazuh.jpeg
Wazuh Computer and Network Security
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreWazuh Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/wazuh.jpeg
Wazuh Computer and Network Security
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Wazuh

Fair
Current Score
754
Baa (Fair)
01000
1 incidents
-1.0 avg impact

Incident timeline with MITRE ATT&CK tactics, techniques, and mitigations.

JANUARY 2026
754
DECEMBER 2025
754
NOVEMBER 2025
754
OCTOBER 2025
753
SEPTEMBER 2025
753
AUGUST 2025
753
JULY 2025
753
JUNE 2025
754
Vulnerability
10 Jun 2025 • Wazuh: Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016)
Mirai Botnets Exploiting CVE-2025-24016 in Wazuh XDR/SIEM Platform

**Mirai Botnets Exploit Critical Wazuh XDR/SIEM Vulnerability (CVE-2025-24016)** Akamai researchers have identified two Mirai botnets actively exploiting a critical remote code execution (RCE) vulnerability (**CVE-2025-24016**) in **Wazuh**, a widely used open-source **XDR/SIEM** platform. The flaw, an **unsafe deserialization issue**, affects **Wazuh Manager versions 4.4.0 through 4.9.0** and can be triggered by attackers with API access—either through a compromised dashboard, server cluster, or, in some configurations, a compromised agent. Exploitation requires valid Wazuh API credentials, which attackers may obtain through prior breaches or credential theft. The vulnerability was **patched in Wazuh 4.9.1 (October 2024)**, but public disclosure in **February 2025** led to active attacks beginning in **March 2025**. The botnets leverage a **public proof-of-concept (PoC) exploit** released on **February 21**, delivering malicious shell scripts that download **Mirai malware variants** targeting multiple architectures, including those common in **IoT devices**. In **May 2025**, Akamai observed a third Mirai botnet attempting similar attacks, though targeting a non-standard Wazuh endpoint—likely another attempt to exploit the same flaw. Beyond Wazuh, these botnets also scan for **legacy vulnerabilities** in **Hadoop YARN, TP-Link, ZTE, Huawei, and ZyXEL routers**, as well as the **RealTek SDK**, demonstrating their adaptability in expanding their infrastructure. The attacks highlight how botnet operators **rapidly weaponize public PoC exploits** to grow their networks, often before organizations apply patches. This trend mirrors recent incidents, such as the **exploitation of a Roundcube RCE flaw**, where attackers reverse-engineered patches to exploit vulnerabilities before widespread remediation.

753
low -1
WAZ1766629994
Botnet Exploitation
Remote Code Execution (RCE)
CVE-2025-24016 (Unsafe Deserialization)
Botnet Expansion
Systems Affected: Wazuh Manager (versions 4.4.0 - 4.9.0), IoT devices Operational Impact: Potential compromise of security monitoring and incident response capabilities Brand Reputation Impact: Potential reputational damage for Wazuh and affected organizations
Third Party Assistance: Akamai Researchers Remediation Measures: Upgrade to Wazuh version 4.9.1 or later
Botnet operators rapidly adapt public PoC exploit code to grow or create new botnets. Organizations must prioritize patching critical vulnerabilities promptly to prevent exploitation.
Upgrade Wazuh Manager to version 4.9.1 or later immediately Monitor for unusual API access or compromised agents Implement network segmentation to limit lateral movement Enhance monitoring for IoT device compromises Stay informed about vulnerability disclosures and apply patches promptly
['Ongoing']
Entry Point: Wazuh API access or compromised agents
Root Causes: Unsafe deserialization vulnerability in Wazuh Manager (CVE-2025-24016), delayed patching by organizations, and rapid exploitation by botnet operators using public PoC code Corrective Actions: Patch management improvements, enhanced API security, and proactive monitoring for exploitation attempts
MAY 2025
754
APRIL 2025
754
MARCH 2025
754
FEBRUARY 2025
754

Frequently Asked Questions

According to Rankiteo, the current A.I.-based Cyber Score for Wazuh is 754, which corresponds to a Fair rating.

According to Rankiteo, the A.I. Rankiteo Cyber Score for December 2025 was 754.

According to Rankiteo, the A.I. Rankiteo Cyber Score for November 2025 was 754.

According to Rankiteo, the A.I. Rankiteo Cyber Score for October 2025 was 753.

According to Rankiteo, the A.I. Rankiteo Cyber Score for September 2025 was 753.

According to Rankiteo, the A.I. Rankiteo Cyber Score for August 2025 was 753.

According to Rankiteo, the A.I. Rankiteo Cyber Score for July 2025 was 753.

According to Rankiteo, the A.I. Rankiteo Cyber Score for June 2025 was 754.

According to Rankiteo, the A.I. Rankiteo Cyber Score for May 2025 was 754.

According to Rankiteo, the A.I. Rankiteo Cyber Score for April 2025 was 754.

According to Rankiteo, the A.I. Rankiteo Cyber Score for March 2025 was 754.

According to Rankiteo, the A.I. Rankiteo Cyber Score for February 2025 was 754.

Over the past 12 months, the average per-incident point impact on Wazuh’s A.I Rankiteo Cyber Score has been -1.0 points.

You can access Wazuh’s cyber incident details on Rankiteo by visiting the following link: https://www.rankiteo.com/company/wazuh.

You can find the summary of the A.I Rankiteo Risk Scoring methodology on Rankiteo by visiting the following link: Rankiteo Algorithm.

You can view Wazuh’s profile page on Rankiteo by visiting the following link: https://www.rankiteo.com/company/wazuh.

With scores of 18.5/20 from OpenAI ChatGPT, 20/20 from Mistral AI, and 17/20 from Claude AI, the A.I. Rankiteo Risk Scoring methodology is validated as a market leader.