{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-31421","assignerOrgId":"271b6943-45a9-4f3a-ab4e-976f3fa05b5a","state":"PUBLISHED","assignerShortName":"elastic","dateReserved":"2023-04-27T18:54:56.705Z","datePublished":"2023-10-26T03:10:52.684Z","dateUpdated":"2024-08-02T14:53:30.714Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Beats","vendor":"Elastic","versions":[{"status":"affected","version":"8.0.0, 8.9.2"}]},{"defaultStatus":"unaffected","product":"Elastic Agent","vendor":"Elastic","versions":[{"status":"affected","version":"8.0.0, 8.9.2"}]},{"defaultStatus":"unaffected","product":"APM Server","vendor":"Elastic","versions":[{"status":"affected","version":"8.0.0, 8.9.2"}]},{"defaultStatus":"unaffected","product":"Fleet Server","vendor":"Elastic","versions":[{"status":"affected","version":"8.0.0, 8.9.2"}]}],"datePublic":"2023-09-19T15:32:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: var(--wht);\">It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.</span>"}],"value":"It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-295","description":"CWE-295: Improper Certificate Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"271b6943-45a9-4f3a-ab4e-976f3fa05b5a","shortName":"elastic","dateUpdated":"2023-10-26T03:10:52.684Z"},"references":[{"url":"https://discuss.elastic.co/t/beats-elastic-agent-apm-server-and-fleet-server-8-10-1-security-update-improper-certificate-validation-issue-esa-2023-16/343385"},{"url":"https://www.elastic.co/community/security"}],"source":{"discovery":"UNKNOWN"},"title":"Beats, Elastic Agent, APM Server, and Fleet Server Improper Certificate Validation issue","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T14:53:30.714Z"},"title":"CVE Program Container","references":[{"url":"https://discuss.elastic.co/t/beats-elastic-agent-apm-server-and-fleet-server-8-10-1-security-update-improper-certificate-validation-issue-esa-2023-16/343385","tags":["x_transferred"]},{"url":"https://www.elastic.co/community/security","tags":["x_transferred"]}]}]}}