Skip to content

It was discovered that when acting as TLS clients, Beats,...

High severity Unreviewed Published Oct 26, 2023 to the GitHub Advisory Database • Updated Nov 8, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.

References

Published by the National Vulnerability Database Oct 26, 2023
Published to the GitHub Advisory Database Oct 26, 2023
Last updated Nov 8, 2023

Severity

High

EPSS score

0.089%
(39th percentile)

Weaknesses

CVE ID

CVE-2023-31421

GHSA ID

GHSA-4x46-8gg7-f9vx

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.