Lucene search

K
ElasticElastic Cloud Enterprise*

6 matches found

CVE
CVE
added 2022/08/25 6:15 p.m.647 views

CVE-2022-23715

A flaw was discovered in ECE before 3.4.0 that might lead to the disclosure of sensitive information such as user passwords and Elasticsearch keystore settings values in logs such as the audit log or deployment logs in the Logging and Monitoring cluster. The affected APIs are PATCH /api/v1/user and...

6.5CVSS6.2AI score0.0024EPSS
CVE
CVE
added 2023/10/26 6:15 p.m.125 views

CVE-2023-31418

An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests. The issue was identified by Elastic Engineering and w...

7.5CVSS7.3AI score0.00549EPSS
CVE
CVE
added 2018/09/19 7:29 p.m.50 views

CVE-2018-3825

In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 a default master encryption key is used in the process of granting ZooKeeper access to Elasticsearch clusters. Unless explicitly overwritten, this master key is predictable across all ECE deployments. If an attacker can connect to ZooKeeper ...

5.9CVSS5.5AI score0.00129EPSS
CVE
CVE
added 2018/09/19 7:29 p.m.46 views

CVE-2018-3828

Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 contain an information exposure vulnerability. It was discovered that certain exception conditions would result in encryption keys, passwords, and other security sensitive headers being leaked to the allocator logs. An attacker with access to t...

7.5CVSS7.3AI score0.0019EPSS
CVE
CVE
added 2022/09/28 8:15 p.m.41 views

CVE-2022-23716

A flaw was discovered in ECE before 3.1.1 that could lead to the disclosure of the SAML signing private key used for the RBAC features, in deployment logs in the Logging and Monitoring cluster.

5.3CVSS5.2AI score0.00275EPSS
CVE
CVE
added 2018/09/19 7:29 p.m.40 views

CVE-2018-3829

In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 it was discovered that a user could scale out allocators on new hosts with an invalid roles token. An attacker with access to the previous runner ID and IP address of the coordinator-host could add a allocator to an existing ECE install to g...

5.3CVSS5.4AI score0.0022EPSS