Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `analysisd` receives a syscollector message with the `hotfix` `msg_type` but lacking a `timestamp`. It uses `cJSON_GetObjectItem()` to get the `timestamp` object item and dereferences it without checking for a `NULL` value. A malicious client can DoS the analysis engine. This vulnerability is fixed in 4.7.1.
Use CWE-476, Wazuh vendor hub and Wazuh product page to widen CVE-2023-49275 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-25770, CVE-2026-25769 and CVE-2025-15617 for nearby disclosures in the same product family.