Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-13629 | Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set. |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 06 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 May 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set. | |
| Title | Logstash Improper Certificate Validation in TCP output | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2025-05-06T17:51:59.631Z
Reserved: 2025-04-16T03:24:04.510Z
Link: CVE-2025-37730
Updated: 2025-05-06T17:51:42.678Z
Status : Deferred
Published: 2025-05-06T18:15:38.410
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-37730
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:42Z
EUVD