CVE-2024-52976
- EPSS 0.01%
- Published 01.05.2025 13:03:58
- Last modified 01.10.2025 19:28:58
Inclusion of functionality from an untrusted control sphere in Elastic Agent subprocess, osqueryd, allows local attackers to execute arbitrary code via parameter injection. An attacker requires local access and the ability to modify osqueryd configu...
CVE-2023-46669
- EPSS 0.01%
- Published 01.05.2025 12:59:49
- Last modified 01.10.2025 19:31:08
Exposure of sensitive information to local unauthorized actors in Elastic Agent and Elastic Security Endpoint can lead to loss of confidentiality and impersonation of Endpoint to the Elastic Stack. This issue was identified by Elastic engineers and E...
CVE-2024-37283
- EPSS 0.27%
- Published 12.08.2024 13:38:23
- Last modified 29.09.2025 14:06:40
An issue was discovered whereby Elastic Agent will leak secrets from the agent policy elastic-agent.yml only when the log level is configured to debug. By default the log level is set to info, where no leak occurs.
CVE-2023-6687
- EPSS 0.4%
- Published 12.12.2023 19:15:08
- Last modified 21.11.2024 08:44:20
An issue was discovered by Elastic whereby Elastic Agent would log a raw event in its own logs at the WARN or ERROR level if ingesting that event to Elasticsearch failed with any 4xx HTTP status code except 409 or 429. Depending on the nature of the ...
CVE-2023-31421
- EPSS 0.09%
- Published 26.10.2023 04:15:16
- Last modified 21.11.2024 08:01:49
It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More...