First published: Thu Oct 26 2023(Updated: )
An issue was discovered in Fleet Server >= v8.10.0 and < v8.10.3 where Agent enrolment tokens are being inserted into the Fleet Server’s log file in plain text. These enrolment tokens could allow someone to enrol an agent into an agent policy, and potentially use that to retrieve other secrets in the policy including for Elasticsearch and third-party services. Alternatively a threat actor could potentially enrol agents to the clusters and send arbitrary events to Elasticsearch.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
>=8.10.0<8.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-46667.
CVE-2023-46667 has a severity rating of 8.1 (high).
Fleet Server versions between 8.10.0 and 8.10.3 are affected by CVE-2023-46667.
CVE-2023-46667 allows agent enrollment tokens to be inserted into the Fleet Server's log file in plain text, potentially allowing unauthorized access to agent policies and other secrets.
Yes, you can find more information about CVE-2023-46667 in the Elastic discussion forum (https://discuss.elastic.co/t/fleet-server-v8-10-3-security-update/344737) and on the Elastic website (https://www.elastic.co/community/security).