If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts.
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/endpoint-v8-10-4-security-update/345203 | Release Notes |
https://www.elastic.co/community/security | Mitigation Vendor Advisory |
Configurations
History
06 Nov 2023, 16:37
Type | Values Removed | Values Added |
---|---|---|
First Time |
Elastic
Elastic endpoint |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
CPE | cpe:2.3:a:elastic:endpoint:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.elastic.co/community/security - Mitigation, Vendor Advisory | |
References | (MISC) https://discuss.elastic.co/t/endpoint-v8-10-4-security-update/345203 - Release Notes | |
CWE | CWE-532 |
26 Oct 2023, 11:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-26 00:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-46668
Mitre link : CVE-2023-46668
CVE.ORG link : CVE-2023-46668
JSON object : View
Products Affected
elastic
- endpoint
CWE
CWE-532
Insertion of Sensitive Information into Log File