Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
References
Link | Resource |
---|---|
https://www.elastic.co/community/security/ | Vendor Advisory |
Configurations
Information
Published : 2020-06-03 11:15
Updated : 2020-06-05 11:37
NVD link : CVE-2020-7010
Mitre link : CVE-2020-7010
JSON object : View
CWE
CWE-335
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
Products Affected
elastic
- elastic_cloud_on_kubernetes