It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-23-security-update-esa-2024-12/364157 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Feb 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
First Time |
Elastic elasticsearch
Elastic |
|
CPE | cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:* | |
References | () https://discuss.elastic.co/t/elasticsearch-8-13-0-7-17-23-security-update-esa-2024-12/364157 - Vendor Advisory |
01 Aug 2024, 12:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
31 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-31 18:15
Updated : 2025-02-04 15:16
NVD link : CVE-2024-23444
Mitre link : CVE-2024-23444
CVE.ORG link : CVE-2024-23444
JSON object : View
Products Affected
elastic
- elasticsearch
CWE
CWE-311
Missing Encryption of Sensitive Data