Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.elastic.co/community/security/ | Vendor Advisory | 
| https://www.elastic.co/community/security/ | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.elastic.co/community/security/ - Vendor Advisory | 
Information
                Published : 2020-06-03 18:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-7010
Mitre link : CVE-2020-7010
CVE.ORG link : CVE-2020-7010
JSON object : View
Products Affected
                elastic
- elastic_cloud_on_kubernetes
CWE
                
                    
                        
                        CWE-335
                        
            Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
