First published: Wed Oct 25 2023(Updated: )
If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
>=7.9.0<=8.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-46668.
The title of this vulnerability is 'Elastic Endpoint Insertion of Sensitive Information into Log File'.
The severity level of CVE-2023-46668 is critical.
Elastic Endpoint versions 7.9.0 to 8.10.3 are affected by this vulnerability.
If Elastic Endpoint is configured to use a non-default option where the logging level is set to debug and Elastic Agent is configured to collect and send logs to Elasticsearch, the Elastic Agent API keys can be viewed in Elasticsearch.