If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts.
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/endpoint-v8-10-4-security-update/345203 | Release Notes |
https://www.elastic.co/community/security | Mitigation Vendor Advisory |
https://discuss.elastic.co/t/endpoint-v8-10-4-security-update/345203 | Release Notes |
https://www.elastic.co/community/security | Mitigation Vendor Advisory |
Configurations
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-26 00:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-46668
Mitre link : CVE-2023-46668
CVE.ORG link : CVE-2023-46668
JSON object : View
Products Affected
elastic
- endpoint
CWE
CWE-532
Insertion of Sensitive Information into Log File