Lucene search

K
cve[email protected]CVE-2023-31421
HistoryOct 26, 2023 - 4:15 a.m.

CVE-2023-31421

2023-10-2604:15:16
CWE-295
web.nvd.nist.gov
29
cve-2023-31421
beats
elastic agent
apm server
fleet server
certificate validation
ip address
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

25.3%

It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate’s IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.

Affected configurations

NVD
Node
elasticelastic_beatsRange8.0.08.9.2
Node
elasticelastic_agentRange8.0.08.9.2
Node
elasticapm_serverRange8.0.08.9.2
Node
elasticelastic_fleet_serverRange8.0.08.9.2

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Beats",
    "vendor": "Elastic",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.0, 8.9.2"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Elastic Agent",
    "vendor": "Elastic",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.0, 8.9.2"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "APM Server",
    "vendor": "Elastic",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.0, 8.9.2"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Fleet Server",
    "vendor": "Elastic",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.0, 8.9.2"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

25.3%

Related for CVE-2023-31421