First published: Tue May 06 2025(Updated: )
Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Logstash Management API |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37730 is considered a high severity vulnerability due to the potential for a man-in-the-middle (MitM) attack.
To fix CVE-2025-37730, ensure that Logstash’s TCP output is configured with proper hostname verification by not setting ssl_verification_mode to full.
CVE-2025-37730 affects multiple versions of Elastic Logstash, primarily those configured in 'client' mode with insufficient hostname verification.
The risks associated with CVE-2025-37730 include exposure to man-in-the-middle attacks that could lead to unauthorized data interception.
As of now, there are no confirmed reports of CVE-2025-37730 being actively exploited in the wild.