Логотип exploitDog
bind:CVE-2023-31421
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-31421

Количество 3

Количество 3

nvd логотип

CVE-2023-31421

больше 2 лет назад

It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-4x46-8gg7-f9vx

больше 2 лет назад

It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2023-08099

больше 2 лет назад

Уязвимость агента для сборки и доставки данных в Elasticsearch или Logstash Elastic Beats, агента для сбора метрик Elastic Agent, серверного программного средства мониторинга и анализа производительности приложений Elastic APM Server, серверного программного средства управление агентами Elastic Agent Elastic Fleet Server, связанная с ошибками процедуры подтверждения подлинности TLS сертификата, позволяющая нарушителю установить соединение с недействительным сертификатом сервера

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-31421

It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
github логотип
GHSA-4x46-8gg7-f9vx

It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-08099

Уязвимость агента для сборки и доставки данных в Elasticsearch или Logstash Elastic Beats, агента для сбора метрик Elastic Agent, серверного программного средства мониторинга и анализа производительности приложений Elastic APM Server, серверного программного средства управление агентами Elastic Agent Elastic Fleet Server, связанная с ошибками процедуры подтверждения подлинности TLS сертификата, позволяющая нарушителю установить соединение с недействительным сертификатом сервера

CVSS3: 5.9
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу