Refine your search

34 vulnerabilities found for kibana by elastic

CERTFR-2025-AVI-1001
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Elastic Kibana. Elles permettent à un attaquant de provoquer une falsification de requêtes côté serveur (SSRF) et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions antérieures à 8.19.7
Elastic Kibana Kibana versions 9.2.x antérieures à 9.2.1
Elastic Kibana Kibana versions 9.1.x antérieures à 9.1.7
References
Bulletin de sécurité Elastic ESA-2025-25 2025-11-12 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-24 2025-11-12 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions ant\u00e9rieures \u00e0 8.19.7",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 9.2.x ant\u00e9rieures \u00e0 9.2.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-37734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37734"
    },
    {
      "name": "CVE-2025-59840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59840"
    }
  ],
  "initial_release_date": "2025-11-13T00:00:00",
  "last_revision_date": "2025-11-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-1001",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-11-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Elastic Kibana. Elles permettent \u00e0 un attaquant de provoquer une falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF) et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": "2025-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-25",
      "url": "https://discuss.elastic.co/t/kibana-8-19-7-9-1-7-9-2-1-security-update-esa-2025-25/383379"
    },
    {
      "published_at": "2025-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-24",
      "url": "https://discuss.elastic.co/t/kibana-8-19-7-9-1-7-and-9-2-1-security-update-esa-2025-24/383381"
    }
  ]
}

CERTFR-2025-AVI-0849
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Elasticsearch Elasticsearch versions 9.1.x antérieures à 9.1.5
Elastic Kibana Kibana - Crowdstrike Connector versions 8.19.x antérieures à 8.19.5
Elastic Elasticsearch Elasticsearch versions 9.0.x antérieures à 9.0.8
Elastic Kibana Kibana - Crowdstrike Connector versions 9.0.x antérieures à 9.0.8
Elastic Kibana Kibana versions 9.0.x antérieures à 9.0.8
Elastic Elasticsearch Elasticsearch versions 8.19.x antérieures à 8.19.5
Elastic Kibana Kibana versions 8.19.x antérieures à 8.19.5
Elastic Kibana Kibana versions 9.1.x antérieures à 9.1.5
Elastic Kibana Kibana - Crowdstrike Connector versions 9.1.x antérieures à 9.1.5
Elastic Elasticsearch Elasticsearch versions antérieures à 8.18.8
Elastic Kibana Kibana - Crowdstrike Connector versions antérieures à 8.18.8
Elastic Kibana Kibana versions antérieures à 8.18.8
References
Bulletin de sécurité Elastic ESA-2025-16 2025-10-06 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-20 2025-10-06 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-19 2025-10-06 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-18 2025-10-06 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-17 2025-10-06 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Elasticsearch versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana - Crowdstrike Connector versions 8.19.x ant\u00e9rieures \u00e0 8.19.5",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 9.0.x ant\u00e9rieures \u00e0 9.0.8",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana - Crowdstrike Connector versions 9.0.x ant\u00e9rieures \u00e0 9.0.8",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 9.0.x ant\u00e9rieures \u00e0 9.0.8",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 8.19.x ant\u00e9rieures \u00e0 8.19.5",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.19.x ant\u00e9rieures \u00e0 8.19.5",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana - Crowdstrike Connector versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions ant\u00e9rieures \u00e0 8.18.8",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana - Crowdstrike Connector versions ant\u00e9rieures \u00e0 8.18.8",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions ant\u00e9rieures \u00e0 8.18.8",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-37728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37728"
    },
    {
      "name": "CVE-2025-25017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25017"
    },
    {
      "name": "CVE-2025-37727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
    },
    {
      "name": "CVE-2025-25009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25009"
    },
    {
      "name": "CVE-2025-25018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25018"
    }
  ],
  "initial_release_date": "2025-10-07T00:00:00",
  "last_revision_date": "2025-10-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0849",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": "2025-10-06",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-16",
      "url": "https://discuss.elastic.co/t/kibana-8-18-8-8-19-4-9-0-7-9-1-4-security-update-esa-2025-16/382450"
    },
    {
      "published_at": "2025-10-06",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-20",
      "url": "https://discuss.elastic.co/t/kibana-8-18-8-8-19-5-9-0-8-and-9-1-5-security-update-esa-2025-20/382449"
    },
    {
      "published_at": "2025-10-06",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-19",
      "url": "https://discuss.elastic.co/t/kibana-crowdstrike-connector-8-18-8-8-19-5-9-0-8-and-9-1-5-security-update-esa-2025-19/382455"
    },
    {
      "published_at": "2025-10-06",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-18",
      "url": "https://discuss.elastic.co/t/elasticsearch-8-18-8-8-19-5-9-0-8-9-1-5-security-update-esa-2025-18/382453"
    },
    {
      "published_at": "2025-10-06",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-17",
      "url": "https://discuss.elastic.co/t/kibana-8-18-8-8-19-5-9-0-8-9-1-5-security-update-esa-2025-17/382451"
    }
  ]
}

CERTFR-2025-AVI-0738
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Elasticsearch Elasticsearch versions 9.0.x antérieures à 9.0.6
Elastic Enterprise Search Enterprise Search versions 8.x antérieures à 8.18.6
Elastic Enterprise Search Enterprise Search versions 8.19.x antérieures à 8.19.3
Elastic Elasticsearch Elasticsearch versions 8.18.x antérieures à 8.18.6
Elastic Elasticsearch Elasticsearch versions 9.1.x antérieures à 9.1.3
Elastic Elasticsearch Elasticsearch versions 8.19.x antérieures à 8.19.3
Elastic Kibana Kibana versions 9.1.x antérieures à 9.1.3
Elastic Kibana Kibana versions 9.0.x antérieures à 9.0.6
References
Bulletin de sécurité Elastic ESA-2025-15 2025-08-28 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-14 2025-08-28 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-13 2025-08-28 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Elasticsearch versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Search versions 8.x ant\u00e9rieures \u00e0 8.18.6",
      "product": {
        "name": "Enterprise Search",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Search versions 8.19.x ant\u00e9rieures \u00e0 8.19.3",
      "product": {
        "name": "Enterprise Search",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 8.18.x ant\u00e9rieures \u00e0 8.18.6",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 9.1.x ant\u00e9rieures \u00e0 9.1.3",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 8.19.x ant\u00e9rieures \u00e0 8.19.3",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 9.1.x ant\u00e9rieures \u00e0 9.1.3",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-54988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
    },
    {
      "name": "CVE-2025-25010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25010"
    }
  ],
  "initial_release_date": "2025-08-29T00:00:00",
  "last_revision_date": "2025-08-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0738",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-15",
      "url": "https://discuss.elastic.co/t/enterprise-search-8-18-6-8-19-3-security-update-esa-2025-15-cve-2025-54988/381428"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-14",
      "url": "https://discuss.elastic.co/t/elasticsearch-8-18-6-8-19-3-9-0-6-and-9-1-3-security-update-esa-2025-14-cve-2025-54988/381427"
    },
    {
      "published_at": "2025-08-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-13",
      "url": "https://discuss.elastic.co/t/kibana-9-0-6-9-1-3-security-update-esa-2025-13/381426"
    }
  ]
}

CERTFR-2025-AVI-0533
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 8.18.x antérieures à 8.18.3
Elastic Kibana Kibana versions 8.x antérieures à 8.17.8
Elastic Kibana Kibana versions antérieures à 7.17.29
Elastic Kibana Kibana versions 9.0.x antérieures à 9.0.3
References
Bulletin de sécurité Elastic ESA-2025-09 2025-06-24 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-10 2025-06-24 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 8.18.x ant\u00e9rieures \u00e0 8.18.3",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.17.8",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions ant\u00e9rieures \u00e0 7.17.29",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 9.0.x ant\u00e9rieures \u00e0 9.0.3",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-2135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
    },
    {
      "name": "CVE-2025-25012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25012"
    }
  ],
  "initial_release_date": "2025-06-25T00:00:00",
  "last_revision_date": "2025-06-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0533",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": "2025-06-24",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-09",
      "url": "https://discuss.elastic.co/t/kibana-7-17-29-8-17-8-8-18-3-9-0-3-security-update-esa-2025-09/379443"
    },
    {
      "published_at": "2025-06-24",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-10",
      "url": "https://discuss.elastic.co/t/kibana-7-17-29-8-17-8-8-18-3-9-0-3-security-update-esa-2025-10/379444"
    }
  ]
}

CERTFR-2025-AVI-0494
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Elastic Kibana. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 8.12.x antérieures à 8.12.1
References
Bulletin de sécurité Elastic ESA-2024-21 2025-06-10 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 8.12.x ant\u00e9rieures \u00e0 8.12.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-43706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43706"
    }
  ],
  "initial_release_date": "2025-06-11T00:00:00",
  "last_revision_date": "2025-06-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0494",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Elastic Kibana. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-21",
      "url": "https://discuss.elastic.co/t/kibana-8-12-1-security-update-esa-2024-21/379064"
    }
  ]
}

CERTFR-2025-AVI-0377
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions antérieures à 8.17.6
Elastic Logstash Logstash versions 8.18.x antérieures à 8.18.1
Elastic Logstash Logstash versions antérieures à 8.17.6
Elastic Kibana Kibana versions 8.18.x antérieures à 8.18.1
Elastic Logstash Logstash versions 9.0.x antérieures à 9.0.1
Elastic Kibana Kibana versions 9.0.x antérieures à 9.0.1
References
Bulletin de sécurité Elastic ESA-2025-07 2025-05-06 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-08 2025-05-06 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions ant\u00e9rieures \u00e0 8.17.6",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Logstash versions 8.18.x ant\u00e9rieures \u00e0 8.18.1",
      "product": {
        "name": "Logstash",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Logstash versions ant\u00e9rieures \u00e0 8.17.6",
      "product": {
        "name": "Logstash",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.18.x ant\u00e9rieures \u00e0 8.18.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Logstash versions 9.0.x ant\u00e9rieures \u00e0 9.0.1",
      "product": {
        "name": "Logstash",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 9.0.x ant\u00e9rieures \u00e0 9.0.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-37730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37730"
    },
    {
      "name": "CVE-2025-25014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25014"
    }
  ],
  "initial_release_date": "2025-05-07T00:00:00",
  "last_revision_date": "2025-05-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0377",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": "2025-05-06",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-07",
      "url": "https://discuss.elastic.co/t/kibana-8-17-6-8-18-1-or-9-0-1-security-update-esa-2025-07/377868"
    },
    {
      "published_at": "2025-05-06",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-08",
      "url": "https://discuss.elastic.co/t/logstash-8-17-6-8-18-1-and-9-0-1-security-update-esa-2025-08/377869"
    }
  ]
}

CERTFR-2025-AVI-0359
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Elasticsearch Elasticsearch versions antérieures à 7.17.25
Elastic Kibana Kibana versions 7.17.x postérieures à 7.14.6 et antérieures à 7.17.24
Elastic APM Server APM Server versions 8.x antérieures à 8.16.1
Elastic Elasticsearch Elasticsearch versions antérieures à 8.16.0
Elastic Logstash Logstash versions 8.15.x antérieures à 8.15.3
Elastic Elastic Agent Elastic Agent versions antérieures à 8.15.4
Elastic Elastic Agent Elastic Agent versions antérieures à 7.17.25
Elastic Kibana Kibana versions 8.x antérieures à 8.13.0
References
Bulletin de sécurité Elastic ESA-2024-47 2025-05-01 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-39 2025-05-01 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-03 2025-05-01 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-20 2025-05-01 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-38 2025-05-01 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-40 2025-05-01 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-41 2025-05-01 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Elasticsearch versions ant\u00e9rieures \u00e0 7.17.25",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 7.17.x post\u00e9rieures \u00e0 7.14.6 et ant\u00e9rieures \u00e0 7.17.24",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "APM Server versions 8.x ant\u00e9rieures \u00e0 8.16.1",
      "product": {
        "name": "APM Server",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions ant\u00e9rieures \u00e0 8.16.0",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Logstash versions 8.15.x ant\u00e9rieures \u00e0 8.15.3",
      "product": {
        "name": "Logstash",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Agent versions ant\u00e9rieures \u00e0 8.15.4",
      "product": {
        "name": "Elastic Agent",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Agent versions ant\u00e9rieures \u00e0 7.17.25",
      "product": {
        "name": "Elastic Agent",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.13.0",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-47561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
    },
    {
      "name": "CVE-2023-46669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46669"
    },
    {
      "name": "CVE-2024-52979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52979"
    },
    {
      "name": "CVE-2024-11994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11994"
    },
    {
      "name": "CVE-2024-11390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11390"
    },
    {
      "name": "CVE-2025-25016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25016"
    },
    {
      "name": "CVE-2024-52976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52976"
    }
  ],
  "initial_release_date": "2025-05-02T00:00:00",
  "last_revision_date": "2025-05-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0359",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": "2025-05-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-47",
      "url": "https://discuss.elastic.co/t/kibana-7-17-19-and-8-13-0-security-update-esa-2024-47/377711"
    },
    {
      "published_at": "2025-05-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-39",
      "url": "https://discuss.elastic.co/t/elastic-agent-7-17-25-and-8-15-4-security-update-esa-2024-39/377708"
    },
    {
      "published_at": "2025-05-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-03",
      "url": "https://discuss.elastic.co/t/elastic-agent-elastic-endpoint-security-security-update-esa-2025-03/377706"
    },
    {
      "published_at": "2025-05-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-20",
      "url": "https://discuss.elastic.co/t/kibana-7-17-24-and-8-12-0-security-update-esa-2024-20/377712"
    },
    {
      "published_at": "2025-05-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-38",
      "url": "https://discuss.elastic.co/t/logstash-8-15-3-security-update-esa-2024-38/377707"
    },
    {
      "published_at": "2025-05-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-40",
      "url": "https://discuss.elastic.co/t/elasticsearch-7-17-25-and-8-16-0-security-update-esa-2024-40/377709"
    },
    {
      "published_at": "2025-05-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-41",
      "url": "https://discuss.elastic.co/t/apm-server-8-16-1-security-update-esa-2024-41/377710"
    }
  ]
}

CERTFR-2025-AVI-0298
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 8.17.x antérieures à 8.17.2
Elastic Logstash Logstash versions antérieures à 8.15.3
Elastic Elastic Defend Elastic Defend versions antérieures à 8.17.3
Elastic Kibana Kibana versions 8.16.x antérieures à 8.16.4
Elastic Kibana Kibana versions 7.17.x antérieures à 7.17.23
Elastic Kibana Kibana versions 8.15.x antérieures à 8.15.1
Elastic Elasticsearch Elasticsearch versions 8.15.x antérieures à 8.15.1
Elastic Elasticsearch Elasticsearch versions 7.17.x antérieures à 7.17.24
References
Bulletin de sécurité Elastic ESA-2024-37 2025-04-08 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-02 2025-04-08 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-35 2025-04-08 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-34 2025-04-08 vendor-advisory
Bulletin de sécurité Elastic ESA-2025-05 2025-04-08 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-48 2025-04-08 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-36 2025-04-08 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 8.17.x ant\u00e9rieures \u00e0 8.17.2",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Logstash versions ant\u00e9rieures \u00e0 8.15.3",
      "product": {
        "name": "Logstash",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Defend versions ant\u00e9rieures \u00e0 8.17.3",
      "product": {
        "name": "Elastic Defend",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.16.x ant\u00e9rieures \u00e0 8.16.4",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 7.17.x ant\u00e9rieures \u00e0 7.17.23",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.15.x ant\u00e9rieures \u00e0 8.15.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 8.15.x ant\u00e9rieures \u00e0 8.15.1",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 7.17.x ant\u00e9rieures \u00e0 7.17.24",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-12556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12556"
    },
    {
      "name": "CVE-2024-43380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43380"
    },
    {
      "name": "CVE-2024-52980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52980"
    },
    {
      "name": "CVE-2025-25013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25013"
    },
    {
      "name": "CVE-2024-52974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52974"
    },
    {
      "name": "CVE-2024-52981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52981"
    },
    {
      "name": "CVE-2024-49761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
    }
  ],
  "initial_release_date": "2025-04-09T00:00:00",
  "last_revision_date": "2025-04-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0298",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-37",
      "url": "https://discuss.elastic.co/t/elasticsearch-7-17-24-and-8-15-1-security-update-esa-2024-37/376924"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-02",
      "url": "https://discuss.elastic.co/t/kibana-8-16-4-and-8-17-2-security-update-esa-2025-02/376918"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-35",
      "url": "https://discuss.elastic.co/t/logstash-8-15-1-security-update-esa-2024-35/376920"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-34",
      "url": "https://discuss.elastic.co/t/elasticsearch-8-15-1-security-update-esa-2024-34/376919"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-05",
      "url": "https://discuss.elastic.co/t/elastic-defend-8-17-3-security-update-esa-2025-05/376921"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-48",
      "url": "https://discuss.elastic.co/t/logstash-8-15-3-8-16-0-security-update-esa-2024-48/376922"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-36",
      "url": "https://discuss.elastic.co/t/kibana-7-17-23-and-8-15-1-security-update-esa-2024-36/376923"
    }
  ]
}

CERTFR-2025-AVI-0178
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Elastic Kibana. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 8.15.x à 8.17.x antérieures à 8.17.3
References
Bulletin de sécurité Elastic ESA-2025-06 2025-03-05 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 8.15.x \u00e0 8.17.x ant\u00e9rieures \u00e0 8.17.3",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-25015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25015"
    }
  ],
  "initial_release_date": "2025-03-05T00:00:00",
  "last_revision_date": "2025-03-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0178",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-05T00:00:00.000000"
    },
    {
      "description": "Modification de l\u0027identifiant CVE (CVE-2025-25012) suite \u00e0 l\u0027erratum de l\u0027\u00e9diteur.",
      "revision_date": "2025-03-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans  Elastic Kibana. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": "2025-03-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2025-06",
      "url": "https://discuss.elastic.co/t/kibana-8-17-3-security-update-esa-2025-06/375441"
    }
  ]
}

CERTFR-2025-AVI-0062
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 7.x antérieures à 7.17.23
Elastic Kibana Kibana versions 8.x antérieures à 8.15.0
Elastic Fleet Server Fleet Server versions antérieures à 8.15.0
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 7.x ant\u00e9rieures \u00e0 7.17.23",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.15.0",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Fleet Server versions ant\u00e9rieures \u00e0 8.15.0",
      "product": {
        "name": "Fleet Server",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-43708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43708"
    },
    {
      "name": "CVE-2024-43707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43707"
    },
    {
      "name": "CVE-2024-43710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43710"
    },
    {
      "name": "CVE-2024-52975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52975"
    },
    {
      "name": "CVE-2024-52972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52972"
    }
  ],
  "initial_release_date": "2025-01-23T00:00:00",
  "last_revision_date": "2025-01-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0062",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-01-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": "2025-01-22",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-31",
      "url": "https://discuss.elastic.co/t/fleet-server-8-15-0-security-update-esa-2024-31/373522"
    },
    {
      "published_at": "2025-01-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-33",
      "url": "https://discuss.elastic.co/t/kibana-7-17-23-8-15-0-security-updates-esa-2024-32-esa-2024-33/373548"
    },
    {
      "published_at": "2025-01-22",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-29 et ESA-2024-30",
      "url": "https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521"
    }
  ]
}

CERTFR-2025-AVI-0050
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Elastic Defend Elastic Defend versions 8.13.x antérieures à 8.13.3
Elastic Elasticsearch Elasticsearch versions 7.17.x antérieures à 7.17.21
Elastic Kibana Kibana versions 7.17.x antérieures à 7.17.23
Elastic Kibana Kibana versions 8.14.x antérieures à 8.14.2
Elastic Elasticsearch Elasticsearch versions 8.13.x antérieures à 8.13.3
References
Bulletin de sécurité Elastic ESA-2024-26 2025-01-21 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-24 2025-01-21 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-25 2025-01-21 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Elastic Defend versions 8.13.x ant\u00e9rieures \u00e0 8.13.3",
      "product": {
        "name": "Elastic Defend",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 7.17.x ant\u00e9rieures \u00e0 7.17.21",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 7.17.x ant\u00e9rieures \u00e0 7.17.23",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.14.x ant\u00e9rieures \u00e0 8.14.2",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 8.13.x ant\u00e9rieures \u00e0 8.13.3",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-43709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43709"
    },
    {
      "name": "CVE-2024-37284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37284"
    },
    {
      "name": "CVE-2024-52973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52973"
    }
  ],
  "initial_release_date": "2025-01-21T00:00:00",
  "last_revision_date": "2025-01-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0050",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-01-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": "2025-01-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-26",
      "url": "https://discuss.elastic.co/t/kibana-7-17-23-and-8-14-2-security-update-esa-2024-26/373443"
    },
    {
      "published_at": "2025-01-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-24",
      "url": "https://discuss.elastic.co/t/elastic-defend-8-13-3-security-update-esa-2024-24/373441"
    },
    {
      "published_at": "2025-01-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-25",
      "url": "https://discuss.elastic.co/t/elasticsearch-7-17-21-and-8-13-3-security-update-esa-2024-25/373442"
    }
  ]
}

CERTFR-2024-AVI-0746
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Elastic Kibana. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 8.x postérieures à 8.10.0 et antérieures à 8.15.1
References
Bulletin de sécurité Elastic ESA-2024-27 2024-09-05 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-28 2024-09-05 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 8.x post\u00e9rieures \u00e0 8.10.0 et ant\u00e9rieures \u00e0 8.15.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37288"
    },
    {
      "name": "CVE-2024-37285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37285"
    }
  ],
  "initial_release_date": "2024-09-06T00:00:00",
  "last_revision_date": "2024-09-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0746",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Elastic Kibana. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": "2024-09-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-27",
      "url": "https://discuss.elastic.co/t/kibana-8-15-1-security-update-esa-2024-27-esa-2024-28/366119"
    },
    {
      "published_at": "2024-09-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-28",
      "url": "https://discuss.elastic.co/t/kibana-8-15-1-security-update-esa-2024-27-esa-2024-28/366119"
    }
  ]
}

CERTFR-2024-AVI-0654
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Kibana. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 7.x antérieures à 7.17.23
Elastic Kibana Kibana versions 8.x antérieures à 8.14.2
References
Bulletin de sécurité Elastic ESA-2024-22 2024-08-05 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 7.x ant\u00e9rieures \u00e0 7.17.23",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.14.2",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37287"
    }
  ],
  "initial_release_date": "2024-08-06T00:00:00",
  "last_revision_date": "2024-08-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0654",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-08-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Kibana. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Kibana",
  "vendor_advisories": [
    {
      "published_at": "2024-08-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-22",
      "url": "https://discuss.elastic.co/t/kibana-8-14-2-7-17-23-security-update-esa-2024-22/364424"
    }
  ]
}

CERTFR-2024-AVI-0638
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Elastic Kibana. Elle permet à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 7.x antérieures à 7.17.23
Elastic Kibana Kibana versions 8.x antérieures à 8.14.0
References
Bulletin de sécurité Elastic 364094 2024-07-30 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 7.x ant\u00e9rieures \u00e0 7.17.23",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.14.0",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37281"
    }
  ],
  "initial_release_date": "2024-07-31T00:00:00",
  "last_revision_date": "2024-07-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0638",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Elastic Kibana. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": "2024-07-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic 364094",
      "url": "https://discuss.elastic.co/t/kibana-7-17-23-8-14-0-security-update-esa-2024-16/364094"
    }
  ]
}

CERTFR-2024-AVI-0500
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Elastic Kibana. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 8.x antérieures à 8.14.0
Elastic Kibana Kibana versions 7.17.x antérieures à 7.17.22
References
Bulletin de sécurité Elastic 361502 2024-06-14 vendor-advisory
Bulletin de sécurité Elastic 361460 2024-06-14 vendor-advisory
Bulletin de sécurité Elastic 361508 2024-06-14 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.14.0",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 7.17.x ant\u00e9rieures \u00e0 7.17.22",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-23443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23443"
    },
    {
      "name": "CVE-2024-2887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2887"
    },
    {
      "name": "CVE-2024-3094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3094"
    },
    {
      "name": "CVE-2024-23442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23442"
    }
  ],
  "initial_release_date": "2024-06-17T00:00:00",
  "last_revision_date": "2024-06-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0500",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-06-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Elastic Kibana. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": "2024-06-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic 361502",
      "url": "https://discuss.elastic.co/t/kibana-8-14-0-7-17-22-security-update/361502"
    },
    {
      "published_at": "2024-06-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic 361460",
      "url": "https://discuss.elastic.co/t/kibana-8-14-0-7-17-22-security-update-esa-2024-11/361460"
    },
    {
      "published_at": "2024-06-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic 361508",
      "url": "https://discuss.elastic.co/t/kibana-7-17-22-8-14-0-security-update-esa-2024-17/361508"
    }
  ]
}

CERTFR-2024-AVI-0466
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Elastic Elastic Cloud Enterprise Elastic Cloud Enterprise versions antérieures à 3.7.1
Elastic Kibana Kibana versions 8.x.x postérieures à 8.6.3 et antérieures à 8.14.0
Elastic Elasticsearch Elasticsearch versions 8.x.x postérieures à 8.10.0 et antérieures à 8.14.0
References
Bulletin de sécurité Elastic ESA-2024-15 2024-06-05 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-08 2024-06-05 vendor-advisory
Bulletin de sécurité Elastic ESA-2024-13 2024-06-06 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Elastic Cloud Enterprise versions ant\u00e9rieures \u00e0 3.7.1",
      "product": {
        "name": "Elastic Cloud Enterprise",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.x.x post\u00e9rieures \u00e0 8.6.3 et ant\u00e9rieures \u00e0 8.14.0",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elasticsearch versions 8.x.x post\u00e9rieures \u00e0 8.10.0 et ant\u00e9rieures \u00e0 8.14.0",
      "product": {
        "name": "Elasticsearch",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2024-37279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37279"
    },
    {
      "name": "CVE-2024-23445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23445"
    }
  ],
  "initial_release_date": "2024-06-06T00:00:00",
  "last_revision_date": "2024-06-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0466",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-06-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Elastic. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": "2024-06-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-15",
      "url": "https://discuss.elastic.co/t/kibana-8-14-0-security-update-esa-2024-15/360887"
    },
    {
      "published_at": "2024-06-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-08",
      "url": "https://discuss.elastic.co/t/elastic-cloud-enterprise-3-7-0-security-update-esa-2024-08/360888"
    },
    {
      "published_at": "2024-06-06",
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-13",
      "url": "https://discuss.elastic.co/t/elasticsearch-8-14-0-security-update-esa-2024-13/360898"
    }
  ]
}

CERTFR-2024-AVI-0107
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Elastic Kibana. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Elastic Kibana Kibana versions antérieures à 7.17.18
Elastic Kibana Kibana versions antérieures à 8.12.1
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions ant\u00e9rieures \u00e0 7.17.18",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions ant\u00e9rieures \u00e0 8.12.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-7024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7024"
    }
  ],
  "initial_release_date": "2024-02-08T00:00:00",
  "last_revision_date": "2024-02-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0107",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Elastic Kibana. Elle permet \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-04 du 8 f\u00e9vrier 2024",
      "url": "https://discuss.elastic.co/t/kibana-8-12-1-7-17-18-security-update-esa-2024-04/352805"
    }
  ]
}

CERTFR-2024-AVI-0099
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits ElasticSearch. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Elastic N/A Elastic Network Drive Connector versions antérieures à 8.12.1.
Elastic APM Server APM Server versions antérieures à 8.12.1
Elastic Kibana Kibana versions antérieures à 8.12.1

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Elastic Network Drive Connector versions ant\u00e9rieures \u00e0 8.12.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "APM Server versions ant\u00e9rieures \u00e0 8.12.1",
      "product": {
        "name": "APM Server",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions ant\u00e9rieures \u00e0 8.12.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-23446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23446"
    },
    {
      "name": "CVE-2024-23448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23448"
    },
    {
      "name": "CVE-2024-23447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23447"
    }
  ],
  "initial_release_date": "2024-02-07T00:00:00",
  "last_revision_date": "2024-02-07T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-02\u00a0 du 06 f\u00e9vrier 2024",
      "url": "https://discuss.elastic.co/t/elastic-network-drive-connector-8-12-1-security-update-esa-2024-02/352687"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-03 du 06 f\u00e9vrier 2024",
      "url": "https://discuss.elastic.co/t/apm-server-8-12-1-security-update-esa-2024-03/352688"
    }
  ],
  "reference": "CERTFR-2024-AVI-0099",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits ElasticSearch\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-01 du 06 f\u00e9vrier 2024",
      "url": "https://discuss.elastic.co/t/kibana-8-12-1-security-update-esa-2024-01/352686"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-023 du 06 f\u00e9vrier 2024",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic ESA-2024-02 du 06 f\u00e9vrier 2024",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-0937
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Kibana et Logstash. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Elastic Kibana Logstash versions 8.10.x et 8.11.x, antérieures à 8.11.1
Elastic Kibana Kibana versions 8.x antérieures à 8.11.1

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Logstash versions 8.10.x et 8.11.x, ant\u00e9rieures \u00e0 8.11.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.11.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-46671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46671"
    },
    {
      "name": "CVE-2023-46672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46672"
    }
  ],
  "initial_release_date": "2023-11-15T00:00:00",
  "last_revision_date": "2023-11-16T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ElasticSearch\u00a0347149 du 14 novembre 2023",
      "url": "https://discuss.elastic.co/t/8-11-1-7-17-15-security-update-esa-2023-25/347149"
    }
  ],
  "reference": "CERTFR-2023-AVI-0937",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-15T00:00:00.000000"
    },
    {
      "description": "Modification des produits affect\u00e9s. L\u0027\u00e9diteur ne consid\u00e8re plus les versions 7.x comme vuln\u00e9rables.",
      "revision_date": "2023-11-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Kibana et Logstash.\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Kibana et Logstash",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 ElasticSearch 347149 du 14 novembre 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 ElasticSearch 347191 du 15 novembre 2023",
      "url": "https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191"
    }
  ]
}

CERTFR-2023-AVI-0353
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Elastic Kibana. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 8.x antérieures à 8.7.1
Elastic Kibana Elastic Stack versions 8.x antérieures à 8.7.0
Elastic Kibana Elastic Stack versions 7.9.x à 7.17.x antérieures à 7.17.10
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 8.x ant\u00e9rieures \u00e0 8.7.1",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Stack versions 8.x ant\u00e9rieures \u00e0 8.7.0",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Stack versions 7.9.x \u00e0 7.17.x ant\u00e9rieures \u00e0 7.17.10",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-26487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26487"
    },
    {
      "name": "CVE-2023-31414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31414"
    },
    {
      "name": "CVE-2023-26486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26486"
    },
    {
      "name": "CVE-2023-31415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31415"
    },
    {
      "name": "CVE-2023-31413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31413"
    }
  ],
  "initial_release_date": "2023-05-03T00:00:00",
  "last_revision_date": "2023-05-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0353",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-05-03T00:00:00.000000"
    },
    {
      "description": "Suppression d\u0027un lien en doublon.",
      "revision_date": "2023-05-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Elastic Kibana.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et\nune injection de code indirecte \u00e0 distance (XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic du 02 mai 2023",
      "url": "https://discuss.elastic.co/t/elastic-stack-8-7-0-7-17-10-security-updates/332327"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Kibana du 02 mai 2023",
      "url": "https://discuss.elastic.co/t/kibana-8-7-1-security-updates/332330"
    }
  ]
}

CERTFR-2023-AVI-0145
Vulnerability from certfr_avis

Une vulnérabilité a été corrigée dans Elastic Kibana. Elles permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Elastic Kibana Elastic Kibana versions 7.x à 7.17.8 antérieures à 7.17.9
Elastic Kibana Elastic Kibana versions 8.x à 8.6.1 antérieures à 8.6.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Elastic Kibana versions 7.x \u00e0 7.17.8 ant\u00e9rieures \u00e0 7.17.9",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Kibana versions 8.x \u00e0 8.6.1 ant\u00e9rieures \u00e0 8.6.2",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-38779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38779"
    }
  ],
  "initial_release_date": "2023-02-17T00:00:00",
  "last_revision_date": "2023-02-17T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ElasticSearch 325782 du 16 f\u00e9vrier 2023",
      "url": "https://discuss.elastic.co/t/kibana-7-17-9-and-8-6-2-security-update/325782"
    }
  ],
  "reference": "CERTFR-2023-AVI-0145",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-02-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eElastic\nKibana\u003c/span\u003e. Elles permet \u00e0 un attaquant de provoquer un contournement\nde la politique de s\u00e9curit\u00e9.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic 325782 du 16 f\u00e9vrier 2023",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-0094
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Elles permettent à un attaquant de provoquer un déni de service à distance et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Elastic Kibana Kibana versions 8.0.x antérieures à 8.6.0
Elastic N/A Elastic Endpoint Security versions 7.17.x antérieures à 7.17.9
Elastic N/A Elastic Endpoint versions antérieures à 8.5.0
Elastic Kibana Kibana versions 7.0.x antérieures à 7.17.8
Elastic N/A Elastic Endgame Security versions antérieure à 3.62.3
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Kibana versions 8.0.x ant\u00e9rieures \u00e0 8.6.0",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Endpoint Security versions 7.17.x ant\u00e9rieures \u00e0 7.17.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Endpoint versions ant\u00e9rieures \u00e0 8.5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Kibana versions 7.0.x ant\u00e9rieures \u00e0 7.17.8",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Endgame Security versions ant\u00e9rieure \u00e0 3.62.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-38778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38778"
    },
    {
      "name": "CVE-2022-38777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38777"
    }
  ],
  "initial_release_date": "2023-02-06T00:00:00",
  "last_revision_date": "2023-02-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0094",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-02-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nElastic. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Elastic",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic 324661 du 6 f\u00e9vrier 2023",
      "url": "https://discuss.elastic.co/t/elastic-7-17-9-8-5-0-and-8-6-1-security-update/324661"
    }
  ]
}

CERTFR-2022-AVI-1121
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Elastic Kibana. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Elastic Kibana Elastic Kibana versions 7.x antérieures à 7.17.8
Elastic Kibana Elastic Kibana versions 8.x antérieures à 8.5.0
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Elastic Kibana versions 7.x ant\u00e9rieures \u00e0 7.17.8",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    },
    {
      "description": "Elastic Kibana versions 8.x ant\u00e9rieures \u00e0 8.5.0",
      "product": {
        "name": "Kibana",
        "vendor": {
          "name": "Elastic",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-1364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1364"
    }
  ],
  "initial_release_date": "2022-12-21T00:00:00",
  "last_revision_date": "2022-12-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-1121",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-12-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Elastic Kibana. Elle permet \u00e0 un\nattaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Elastic Kibana",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Elastic 320920 du 09 d\u00e9cembre 2022",
      "url": "https://discuss.elastic.co/t/7-17-8-8-5-0-security-update/320920"
    }
  ]
}

CVE-2025-37734 (GCVE-0-2025-37734)
Vulnerability from nvd
Published
2025-11-12 09:57
Modified
2025-11-12 14:16
CWE
  • CWE-346 - Origin Validation Error
Summary
Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant.
Impacted products
Vendor Product Version
Elastic Kibana Version: 8.12.0    8.19.6
Version: 9.1.0    9.1.6
Version: 9.2.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37734",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-12T14:16:20.420596Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-12T14:16:35.035Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Kibana",
          "repo": "https://github.com/kibana",
          "vendor": "Elastic",
          "versions": [
            {
              "lessThanOrEqual": "8.19.6",
              "status": "affected",
              "version": "8.12.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.1.6",
              "status": "affected",
              "version": "9.1.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "9.2.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant."
            }
          ],
          "value": "Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-346",
              "description": "CWE-346 Origin Validation Error",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-12T09:57:22.782Z",
        "orgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
        "shortName": "elastic"
      },
      "references": [
        {
          "url": "https://discuss.elastic.co/t/kibana-8-19-7-9-1-7-and-9-2-1-security-update-esa-2025-24/383381"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Kibana Origin Validation Error",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
    "assignerShortName": "elastic",
    "cveId": "CVE-2025-37734",
    "datePublished": "2025-11-12T09:57:22.782Z",
    "dateReserved": "2025-04-16T03:24:04.511Z",
    "dateUpdated": "2025-11-12T14:16:35.035Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37735 (GCVE-0-2025-37735)
Vulnerability from nvd
Published
2025-11-06 14:27
Modified
2025-11-07 04:56
CWE
  • CWE-281 - Improper Preservation of Permissions
Summary
Improper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation.
Impacted products
Vendor Product Version
Elastic Kibana Version: 8.0.0    8.19.5
Version: 9.0.0    9.1.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37735",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-06T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-07T04:56:11.390Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Kibana",
          "vendor": "Elastic",
          "versions": [
            {
              "lessThanOrEqual": "8.19.5",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.1.5",
              "status": "affected",
              "version": "9.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eImproper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "Improper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-281",
              "description": "CWE-281 Improper Preservation of Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-06T14:27:26.235Z",
        "orgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
        "shortName": "elastic"
      },
      "references": [
        {
          "url": "https://discuss.elastic.co/t/elastic-defend-8-19-6-9-1-6-and-9-2-0-security-update-esa-2025-23/383272"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
    "assignerShortName": "elastic",
    "cveId": "CVE-2025-37735",
    "datePublished": "2025-11-06T14:27:26.235Z",
    "dateReserved": "2025-04-16T03:24:04.511Z",
    "dateUpdated": "2025-11-07T04:56:11.390Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-25018 (GCVE-0-2025-25018)
Vulnerability from nvd
Published
2025-10-10 09:50
Modified
2025-10-14 03:55
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS)
Impacted products
Vendor Product Version
Elastic Kibana Version: 7.0.0    7.17.29
Version: 8.0.0    8.18.7
Version: 8.19.0    8.19.4
Version: 9.0.0    9.0.7
Version: 9.1.0    9.1.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25018",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-09T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-14T03:55:14.473Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Kibana",
          "repo": "https://github.com/kibana",
          "vendor": "Elastic",
          "versions": [
            {
              "lessThanOrEqual": "7.17.29",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.18.7",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.19.4",
              "status": "affected",
              "version": "8.19.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.0.7",
              "status": "affected",
              "version": "9.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.1.4",
              "status": "affected",
              "version": "9.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper Neutralization of Input During Web Page Generation\u003c/span\u003e in Kibana can lead to stored Cross-Site Scripting (XSS)\u003c/p\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS)"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-10T09:51:21.105Z",
        "orgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
        "shortName": "elastic"
      },
      "references": [
        {
          "url": "https://https://discuss.elastic.co/t/kibana-8-18-8-8-19-5-9-0-8-9-1-5-security-update-esa-2025-17/382451"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Kibana Stored Cross-Site Scripting (XSS)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
    "assignerShortName": "elastic",
    "cveId": "CVE-2025-25018",
    "datePublished": "2025-10-10T09:50:35.448Z",
    "dateReserved": "2025-01-31T15:28:16.918Z",
    "dateUpdated": "2025-10-14T03:55:14.473Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-25017 (GCVE-0-2025-25017)
Vulnerability from nvd
Published
2025-10-10 09:53
Modified
2025-10-10 16:43
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS)
Impacted products
Vendor Product Version
Elastic Kibana Version: 7.0.0    7.17.29
Version: 8.0.0    8.18.7
Version: 8.19.0    8.19.3
Version: 9.0.0    9.0.6
Version: 9.1.0    9.1.3
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25017",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-10T16:43:44.510281Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-10T16:43:55.939Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Kibana",
          "repo": "https://github.com/kibana",
          "vendor": "Elastic",
          "versions": [
            {
              "lessThanOrEqual": "7.17.29",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.18.7",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.19.3",
              "status": "affected",
              "version": "8.19.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.0.6",
              "status": "affected",
              "version": "9.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.1.3",
              "status": "affected",
              "version": "9.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper Neutralization of Input During Web Page Generation\u003c/span\u003e in Kibana can lead to Cross-Site Scripting (XSS)\u003c/p\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS)"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-10T09:53:25.634Z",
        "orgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
        "shortName": "elastic"
      },
      "references": [
        {
          "url": "https://discuss.elastic.co/t/kibana-8-18-8-8-19-4-9-0-7-9-1-4-security-update-esa-2025-16/382450"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Kibana Stored Cross-Site Scripting (XSS)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
    "assignerShortName": "elastic",
    "cveId": "CVE-2025-25017",
    "datePublished": "2025-10-10T09:53:25.634Z",
    "dateReserved": "2025-01-31T15:28:16.918Z",
    "dateUpdated": "2025-10-10T16:43:55.939Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-25009 (GCVE-0-2025-25009)
Vulnerability from nvd
Published
2025-10-07 13:59
Modified
2025-10-07 14:37
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload.
Impacted products
Vendor Product Version
Elastic Kibana Version: 7.0.0    7.17.29
Version: 8.14.0    8.18.7
Version: 8.19.0    8.19.4
Version: 9.0.0    9.0.7
Version: 9.1.0    9.1.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25009",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-07T14:25:43.077649Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-07T14:37:39.070Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Kibana",
          "repo": "https://github.com/elastic/kibana",
          "vendor": "Elastic",
          "versions": [
            {
              "lessThanOrEqual": "7.17.29",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.18.7",
              "status": "affected",
              "version": "8.14.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.19.4",
              "status": "affected",
              "version": "8.19.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.0.7",
              "status": "affected",
              "version": "9.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.1.4",
              "status": "affected",
              "version": "9.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eImproper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload.\u003c/span\u003e\u003c/p\u003e\u003c/span\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-07T13:59:00.890Z",
        "orgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
        "shortName": "elastic"
      },
      "references": [
        {
          "url": "https://discuss.elastic.co/t/kibana-8-18-8-8-19-5-9-0-8-and-9-1-5-security-update-esa-2025-20/382449"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Kibana Cross-Site Scripting (XSS)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
    "assignerShortName": "elastic",
    "cveId": "CVE-2025-25009",
    "datePublished": "2025-10-07T13:59:00.890Z",
    "dateReserved": "2025-01-31T15:28:16.917Z",
    "dateUpdated": "2025-10-07T14:37:39.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-37734 (GCVE-0-2025-37734)
Vulnerability from cvelistv5
Published
2025-11-12 09:57
Modified
2025-11-12 14:16
CWE
  • CWE-346 - Origin Validation Error
Summary
Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant.
Impacted products
Vendor Product Version
Elastic Kibana Version: 8.12.0    8.19.6
Version: 9.1.0    9.1.6
Version: 9.2.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37734",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-12T14:16:20.420596Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-12T14:16:35.035Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Kibana",
          "repo": "https://github.com/kibana",
          "vendor": "Elastic",
          "versions": [
            {
              "lessThanOrEqual": "8.19.6",
              "status": "affected",
              "version": "8.12.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.1.6",
              "status": "affected",
              "version": "9.1.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "9.2.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant."
            }
          ],
          "value": "Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-346",
              "description": "CWE-346 Origin Validation Error",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-12T09:57:22.782Z",
        "orgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
        "shortName": "elastic"
      },
      "references": [
        {
          "url": "https://discuss.elastic.co/t/kibana-8-19-7-9-1-7-and-9-2-1-security-update-esa-2025-24/383381"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Kibana Origin Validation Error",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
    "assignerShortName": "elastic",
    "cveId": "CVE-2025-37734",
    "datePublished": "2025-11-12T09:57:22.782Z",
    "dateReserved": "2025-04-16T03:24:04.511Z",
    "dateUpdated": "2025-11-12T14:16:35.035Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-37735 (GCVE-0-2025-37735)
Vulnerability from cvelistv5
Published
2025-11-06 14:27
Modified
2025-11-07 04:56
CWE
  • CWE-281 - Improper Preservation of Permissions
Summary
Improper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation.
Impacted products
Vendor Product Version
Elastic Kibana Version: 8.0.0    8.19.5
Version: 9.0.0    9.1.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-37735",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-06T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-07T04:56:11.390Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Kibana",
          "vendor": "Elastic",
          "versions": [
            {
              "lessThanOrEqual": "8.19.5",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "9.1.5",
              "status": "affected",
              "version": "9.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eImproper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "Improper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-281",
              "description": "CWE-281 Improper Preservation of Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-06T14:27:26.235Z",
        "orgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
        "shortName": "elastic"
      },
      "references": [
        {
          "url": "https://discuss.elastic.co/t/elastic-defend-8-19-6-9-1-6-and-9-2-0-security-update-esa-2025-23/383272"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "271b6943-45a9-4f3a-ab4e-976f3fa05b5a",
    "assignerShortName": "elastic",
    "cveId": "CVE-2025-37735",
    "datePublished": "2025-11-06T14:27:26.235Z",
    "dateReserved": "2025-04-16T03:24:04.511Z",
    "dateUpdated": "2025-11-07T04:56:11.390Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}