CVE-2023-46668

If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:elastic:endpoint:*:*:*:*:*:*:*:*

History

06 Nov 2023, 16:37

Type Values Removed Values Added
First Time Elastic
Elastic endpoint
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CPE cpe:2.3:a:elastic:endpoint:*:*:*:*:*:*:*:*
References (MISC) https://www.elastic.co/community/security - (MISC) https://www.elastic.co/community/security - Mitigation, Vendor Advisory
References (MISC) https://discuss.elastic.co/t/endpoint-v8-10-4-security-update/345203 - (MISC) https://discuss.elastic.co/t/endpoint-v8-10-4-security-update/345203 - Release Notes
CWE CWE-532

26 Oct 2023, 11:44

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-26 00:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-46668

Mitre link : CVE-2023-46668

CVE.ORG link : CVE-2023-46668


JSON object : View

Products Affected

elastic

  • endpoint
CWE
CWE-532

Insertion of Sensitive Information into Log File