// For flags

CVE-2023-31416

Elastic Cloud on Kubernetes (ECK) secret token configuration issue

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Secret token configuration is never applied when using ECK <2.8 with APM Server >=8.0. This could lead to anonymous requests to an APM Server being accepted and the data ingested into this APM deployment.

La configuración del token secreto nunca se aplica cuando se usa ECK &lt;2.8 con APM Server&gt;=8.0. Esto podría dar lugar a que se acepten solicitudes anónimas a un servidor APM y que los datos se ingieran en esta implementación de APM.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-04-27 CVE Reserved
  • 2023-10-26 CVE Published
  • 2023-11-07 EPSS Updated
  • 2024-09-09 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Elastic
Search vendor "Elastic"
Elastic Cloud On Kubernetes
Search vendor "Elastic" for product "Elastic Cloud On Kubernetes"
< 2.8
Search vendor "Elastic" for product "Elastic Cloud On Kubernetes" and version " < 2.8"
-
Affected
in Elastic
Search vendor "Elastic"
Apm Server
Search vendor "Elastic" for product "Apm Server"
>= 8.0.0
Search vendor "Elastic" for product "Apm Server" and version " >= 8.0.0"
-
Safe