- Description
- It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.
- Source
- bressers@elastic.co
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elastic:elastic_beats:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F350E05B-DF03-4D1F-95A4-4F6C14DD1640",
"versionEndIncluding": "8.9.2",
"versionStartIncluding": "8.0.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elastic:elastic_agent:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9CB5A9F5-BEFA-472C-A29B-4E71F2B19609",
"versionEndIncluding": "8.9.2",
"versionStartIncluding": "8.0.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elastic:apm_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8E6E46E9-87C4-4422-AB28-811252254A88",
"versionEndIncluding": "8.9.2",
"versionStartIncluding": "8.0.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elastic:elastic_fleet_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F77F3ECE-C5B8-4BBB-B1B5-986DBCA2C0EE",
"versionEndIncluding": "8.9.2",
"versionStartIncluding": "8.0.0"
}
],
"operator": "OR"
}
]
}
]