Vulnerability Details CVE-2019-7620
Logstash versions before 7.4.1 and 6.8.4 contain a denial of service flaw in the Logstash Beats input plugin. An unauthenticated user who is able to connect to the port the Logstash beats input could send a specially crafted network packet that would cause Logstash to stop responding.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.014
EPSS Ranking 79.7%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2019-7620
-
cpe:2.3:a:elastic:logstash:6.0.0
-
cpe:2.3:a:elastic:logstash:6.0.1
-
cpe:2.3:a:elastic:logstash:6.1.0
-
cpe:2.3:a:elastic:logstash:6.1.1
-
cpe:2.3:a:elastic:logstash:6.1.2
-
cpe:2.3:a:elastic:logstash:6.1.3
-
cpe:2.3:a:elastic:logstash:6.1.4
-
cpe:2.3:a:elastic:logstash:6.2.0
-
cpe:2.3:a:elastic:logstash:6.2.1
-
cpe:2.3:a:elastic:logstash:6.2.2
-
cpe:2.3:a:elastic:logstash:6.2.3
-
cpe:2.3:a:elastic:logstash:6.2.4
-
cpe:2.3:a:elastic:logstash:6.3.0
-
cpe:2.3:a:elastic:logstash:6.3.1
-
cpe:2.3:a:elastic:logstash:6.3.2
-
cpe:2.3:a:elastic:logstash:6.4.0
-
cpe:2.3:a:elastic:logstash:6.4.1
-
cpe:2.3:a:elastic:logstash:6.4.2
-
cpe:2.3:a:elastic:logstash:6.4.3
-
cpe:2.3:a:elastic:logstash:6.5.0
-
cpe:2.3:a:elastic:logstash:6.5.1
-
cpe:2.3:a:elastic:logstash:6.5.2
-
cpe:2.3:a:elastic:logstash:6.5.3
-
cpe:2.3:a:elastic:logstash:6.5.4
-
cpe:2.3:a:elastic:logstash:6.6.0
-
cpe:2.3:a:elastic:logstash:6.6.1
-
cpe:2.3:a:elastic:logstash:6.6.2
-
cpe:2.3:a:elastic:logstash:6.7.0
-
cpe:2.3:a:elastic:logstash:6.7.1
-
cpe:2.3:a:elastic:logstash:6.7.2
-
cpe:2.3:a:elastic:logstash:6.8.0
-
cpe:2.3:a:elastic:logstash:6.8.1
-
cpe:2.3:a:elastic:logstash:6.8.2
-
cpe:2.3:a:elastic:logstash:6.8.3
-
cpe:2.3:a:elastic:logstash:7.0.0
-
cpe:2.3:a:elastic:logstash:7.0.1
-
cpe:2.3:a:elastic:logstash:7.1.0
-
cpe:2.3:a:elastic:logstash:7.1.1
-
cpe:2.3:a:elastic:logstash:7.2.0
-
cpe:2.3:a:elastic:logstash:7.2.1
-
cpe:2.3:a:elastic:logstash:7.3.0
-
cpe:2.3:a:elastic:logstash:7.3.1
-
cpe:2.3:a:elastic:logstash:7.3.2
-
cpe:2.3:a:elastic:logstash:7.4.0