CVE-2020-7010

Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:elastic:elastic_cloud_on_kubernetes:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () https://www.elastic.co/community/security/ - Vendor Advisory () https://www.elastic.co/community/security/ - Vendor Advisory

Information

Published : 2020-06-03 18:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-7010

Mitre link : CVE-2020-7010

CVE.ORG link : CVE-2020-7010


JSON object : View

Products Affected

elastic

  • elastic_cloud_on_kubernetes
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)