Refine your search
4 vulnerabilities found for APM Server by Elastic
CERTFR-2025-AVI-0636
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Elastic | APM Server | APM Server versions antérieures à 8.16.3 | ||
Elastic | Beats | Beats versions antérieures à 9.1.0 | ||
Elastic | APM Server | APM Server versions 8.17.x antérieures à 8.17.1 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "APM Server versions ant\u00e9rieures \u00e0 8.16.3", "product": { "name": "APM Server", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "Beats versions ant\u00e9rieures \u00e0 9.1.0", "product": { "name": "Beats", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "APM Server versions 8.17.x ant\u00e9rieures \u00e0 8.17.1", "product": { "name": "APM Server", "vendor": { "name": "Elastic", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-25011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25011" }, { "name": "CVE-2025-0712", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0712" } ], "initial_release_date": "2025-07-30T00:00:00", "last_revision_date": "2025-07-30T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0636", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-30T00:00:00.000000" } ], "risks": [ { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic", "vendor_advisories": [ { "published_at": "2025-07-29", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-01", "url": "https://discuss.elastic.co/t/apm-server-windows-installer-8-16-3-8-17-1-security-update-esa-2025-01/380557" }, { "published_at": "2025-07-29", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-12", "url": "https://discuss.elastic.co/t/beats-windows-installer-9-1-0-security-update-esa-2025-12/380558" } ] }
CERTFR-2025-AVI-0359
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Elastic. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Elastic | Elasticsearch | Elasticsearch versions antérieures à 7.17.25 | ||
Elastic | Kibana | Kibana versions 7.17.x postérieures à 7.14.6 et antérieures à 7.17.24 | ||
Elastic | APM Server | APM Server versions 8.x antérieures à 8.16.1 | ||
Elastic | Elasticsearch | Elasticsearch versions antérieures à 8.16.0 | ||
Elastic | Logstash | Logstash versions 8.15.x antérieures à 8.15.3 | ||
Elastic | Elastic Agent | Elastic Agent versions antérieures à 8.15.4 | ||
Elastic | Elastic Agent | Elastic Agent versions antérieures à 7.17.25 | ||
Elastic | Kibana | Kibana versions 8.x antérieures à 8.13.0 |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Elasticsearch versions ant\u00e9rieures \u00e0 7.17.25", "product": { "name": "Elasticsearch", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "Kibana versions 7.17.x post\u00e9rieures \u00e0 7.14.6 et ant\u00e9rieures \u00e0 7.17.24", "product": { "name": "Kibana", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "APM Server versions 8.x ant\u00e9rieures \u00e0 8.16.1", "product": { "name": "APM Server", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "Elasticsearch versions ant\u00e9rieures \u00e0 8.16.0", "product": { "name": "Elasticsearch", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "Logstash versions 8.15.x ant\u00e9rieures \u00e0 8.15.3", "product": { "name": "Logstash", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "Elastic Agent versions ant\u00e9rieures \u00e0 8.15.4", "product": { "name": "Elastic Agent", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "Elastic Agent versions ant\u00e9rieures \u00e0 7.17.25", "product": { "name": "Elastic Agent", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.13.0", "product": { "name": "Kibana", "vendor": { "name": "Elastic", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "name": "CVE-2023-46669", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46669" }, { "name": "CVE-2024-52979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52979" }, { "name": "CVE-2024-11994", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11994" }, { "name": "CVE-2024-11390", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11390" }, { "name": "CVE-2025-25016", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25016" }, { "name": "CVE-2024-52976", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52976" } ], "initial_release_date": "2025-05-02T00:00:00", "last_revision_date": "2025-05-02T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0359", "revisions": [ { "description": "Version initiale", "revision_date": "2025-05-02T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic", "vendor_advisories": [ { "published_at": "2025-05-01", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-47", "url": "https://discuss.elastic.co/t/kibana-7-17-19-and-8-13-0-security-update-esa-2024-47/377711" }, { "published_at": "2025-05-01", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-39", "url": "https://discuss.elastic.co/t/elastic-agent-7-17-25-and-8-15-4-security-update-esa-2024-39/377708" }, { "published_at": "2025-05-01", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-03", "url": "https://discuss.elastic.co/t/elastic-agent-elastic-endpoint-security-security-update-esa-2025-03/377706" }, { "published_at": "2025-05-01", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-20", "url": "https://discuss.elastic.co/t/kibana-7-17-24-and-8-12-0-security-update-esa-2024-20/377712" }, { "published_at": "2025-05-01", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-38", "url": "https://discuss.elastic.co/t/logstash-8-15-3-security-update-esa-2024-38/377707" }, { "published_at": "2025-05-01", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-40", "url": "https://discuss.elastic.co/t/elasticsearch-7-17-25-and-8-16-0-security-update-esa-2024-40/377709" }, { "published_at": "2025-05-01", "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-41", "url": "https://discuss.elastic.co/t/apm-server-8-16-1-security-update-esa-2024-41/377710" } ] }
CERTFR-2024-AVI-0690
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Elastic APM Server. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Elastic | APM Server | APM Server versions antérieures à 7.17.21 | ||
Elastic | APM Server | APM Server versions antérieures à 8.14.0 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "APM Server versions ant\u00e9rieures \u00e0 7.17.21", "product": { "name": "APM Server", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "APM Server versions ant\u00e9rieures \u00e0 8.14.0", "product": { "name": "APM Server", "vendor": { "name": "Elastic", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" } ], "initial_release_date": "2024-08-16T00:00:00", "last_revision_date": "2024-08-16T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0690", "revisions": [ { "description": "Version initiale", "revision_date": "2024-08-16T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Elastic APM Server. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Vuln\u00e9rabilit\u00e9 dans Elastic APM Server", "vendor_advisories": [ { "published_at": "2024-08-15", "title": "Bulletin de s\u00e9curit\u00e9 Elastic 364946", "url": "https://discuss.elastic.co/t/apm-server-8-14-0-security-update-esa-2024-09/364946" } ] }
CERTFR-2024-AVI-0099
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits ElasticSearch. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Elastic Network Drive Connector versions ant\u00e9rieures \u00e0 8.12.1.", "product": { "name": "N/A", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "APM Server versions ant\u00e9rieures \u00e0 8.12.1", "product": { "name": "APM Server", "vendor": { "name": "Elastic", "scada": false } } }, { "description": "Kibana versions ant\u00e9rieures \u00e0 8.12.1", "product": { "name": "Kibana", "vendor": { "name": "Elastic", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-23446", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23446" }, { "name": "CVE-2024-23448", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23448" }, { "name": "CVE-2024-23447", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23447" } ], "initial_release_date": "2024-02-07T00:00:00", "last_revision_date": "2024-02-07T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-02\u00a0 du 06 f\u00e9vrier 2024", "url": "https://discuss.elastic.co/t/elastic-network-drive-connector-8-12-1-security-update-esa-2024-02/352687" }, { "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-03 du 06 f\u00e9vrier 2024", "url": "https://discuss.elastic.co/t/apm-server-8-12-1-security-update-esa-2024-03/352688" } ], "reference": "CERTFR-2024-AVI-0099", "revisions": [ { "description": "Version initiale", "revision_date": "2024-02-07T00:00:00.000000" } ], "risks": [ { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits ElasticSearch\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et\nun contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-01 du 06 f\u00e9vrier 2024", "url": "https://discuss.elastic.co/t/kibana-8-12-1-security-update-esa-2024-01/352686" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-023 du 06 f\u00e9vrier 2024", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-02 du 06 f\u00e9vrier 2024", "url": null } ] }