Description
If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts.
Published: 2023-10-25
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-50859 If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts.
History

No history.

Subscriptions

Elastic Endpoint
cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2024-09-09T19:34:43.300Z

Reserved: 2023-10-24T17:28:32.185Z

Link: CVE-2023-46668

cve-icon Vulnrichment

Updated: 2024-08-02T20:53:20.986Z

cve-icon NVD

Status : Modified

Published: 2023-10-26T00:15:12.150

Modified: 2024-11-21T08:29:01.693

Link: CVE-2023-46668

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses