First published: Thu May 13 2021(Updated: )
In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Logstash | >=6.4.0<6.8.15 | |
Elastic Logstash | >=7.0.0<7.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22138 is a TLS certificate validation flaw found in Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 that could result in a man-in-the-middle attack.
CVE-2021-22138 affects Logstash by allowing an attacker to perform a man-in-the-middle attack due to a TLS certificate validation flaw in the monitoring feature.
CVE-2021-22138 has a severity rating of medium with a value of 3.7.
To fix CVE-2021-22138 in Logstash, update to version 6.8.15 or above for Logstash 6.x and version 7.12.0 or above for Logstash 7.x.
You can find more information about CVE-2021-22138 in the following references: [Link 1](https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125), [Link 2](https://security.netapp.com/advisory/ntap-20210629-0001/).