First published: Wed Jul 31 2024(Updated: )
It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.
Credit: bressers@elastic.co bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.elasticsearch:elasticsearch | <7.17.23 | 7.17.23 |
maven/org.elasticsearch:elasticsearch | >=8.0.0-alpha1<8.13.0 | 8.13.0 |
Elastic Elasticsearch | >=7.0.0<7.17.23 | |
Elastic Elasticsearch | >=8.0.0<8.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23444 is classified as a high-severity vulnerability due to the exposure of unencrypted private keys.
To mitigate CVE-2024-23444, upgrade to Elasticsearch versions 7.17.23 or 8.13.0 or later.
If exploited, CVE-2024-23444 allows unauthorized access to unencrypted private keys, compromising the security of the certificate signing process.
CVE-2024-23444 affects Elasticsearch versions below 7.17.23 and between 8.0.0-alpha1 and 8.13.0.
CVE-2024-23444 was discovered by engineers at Elastic.