Critical Fleet Server Vulnerability

A critical vulnerability (CVE-2024-52975) has been identified in Elastic’s Fleet Server, posing a severe risk of sensitive information exposure. 

The flaw, affecting Fleet Server versions 8.13.0 through 8.15.0, allows sensitive data to be logged at the INFO and ERROR log levels, potentially exposing confidential details depending on the integrations enabled.

Details of the Vulnerability

The vulnerability stems from improper logging practices within the Fleet Server. Specifically, Fleet policies—potentially containing sensitive information—were inadvertently logged at inappropriate levels (INFO and ERROR). 

This logging behavior could expose sensitive data to unauthorized actors if malicious entities access logs.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

The issue is classified as CWE-200: Exposure of Sensitive Information to an Unauthorized Actor and carries a CVSS v3.1 score of 9.0, marking it as critical. 

The attack vector is through an adjacent network, with low attack complexity and low privileges required.

No user interaction is necessary for exploitation, and the vulnerability has a “changed” scope, meaning it could impact systems beyond the vulnerable component.

Potential Impact

The data logged could include critical configuration details or other sensitive information depending on the integrations enabled in Fleet Server. This creates a significant risk of confidentiality breaches, unauthorized access, or further exploitation of affected systems.

While there is no current evidence of active exploitation or proof-of-concept code available in the public domain, the severity of this vulnerability necessitates immediate action by users.

Elastic has released a security update to address this issue. Users are strongly urged to take the following steps:

  • Upgrade Immediately: Update Fleet Server to version 8.15.0 or later, which contains the necessary security fix.
  • Audit Logs: Review existing logs for potential exposure of sensitive information.
  • Restrict Access: Implement network segmentation to limit access to Fleet Server from untrusted networks.
  • Enhance Monitoring: Deploy additional logging and monitoring solutions to detect suspicious activity or exploitation attempts.
  • Apply Least Privilege Principle: Ensure all systems and users interacting with Fleet Server operate under the principle of least privilege.

This vulnerability underscores the importance of secure logging practices in enterprise software systems. Organizations using Elastic’s Fleet Server must act swiftly to mitigate risks associated with CVE-2024-52975 by upgrading their systems and reviewing their security configurations.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.