Vulnerabilities
Vulnerable Software
Secret token configuration is never applied when using ECK <2.8 with APM Server >=8.0. This could lead to anonymous requests to an APM Server being accepted and the data ingested into this APM deployment.
CVSS Score
5.3
EPSS Score
0.001
Published
2023-10-26
Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
CVSS Score
7.5
EPSS Score
0.004
Published
2020-06-03


Contact Us

Shodan ® - All rights reserved