CVE-2018-3825

In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 a default master encryption key is used in the process of granting ZooKeeper access to Elasticsearch clusters. Unless explicitly overwritten, this master key is predictable across all ECE deployments. If an attacker can connect to ZooKeeper directly they would be able to access configuration information of other tenants if their cluster ID is known.
Configurations

Configuration 1 (hide)

cpe:2.3:a:elastic:elastic_cloud_enterprise:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:06

Type Values Removed Values Added
References () https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778 - Vendor Advisory () https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778 - Vendor Advisory
References () https://www.elastic.co/community/security - Vendor Advisory () https://www.elastic.co/community/security - Vendor Advisory

Information

Published : 2018-09-19 19:29

Updated : 2024-11-21 04:06


NVD link : CVE-2018-3825

Mitre link : CVE-2018-3825

CVE.ORG link : CVE-2018-3825


JSON object : View

Products Affected

elastic

  • elastic_cloud_enterprise
CWE
CWE-321

Use of Hard-coded Cryptographic Key

CWE-1188

Insecure Default Initialization of Resource