First published: Mon Sep 09 2024(Updated: )
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic | =8.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37288 is classified as a critical vulnerability due to the potential for arbitrary code execution.
To mitigate CVE-2024-37288, users should upgrade Kibana to version 8.15.1 or later to address the deserialization issue.
CVE-2024-37288 specifically affects Kibana version 8.15.0 when utilizing Elastic Security's built-in AI tools.
Yes, the arbitrary code execution capability of CVE-2024-37288 could potentially enable unauthorized access to sensitive data.
Only those using Kibana 8.15.0 with Elastic Security's AI tools are at risk from CVE-2024-37288.