Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
History

Tue, 06 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 May 2025 17:45:00 +0000

Type Values Removed Values Added
Description Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
Title Logstash Improper Certificate Validation in TCP output
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published: 2025-05-06T17:29:07.189Z

Updated: 2025-05-06T17:51:59.631Z

Reserved: 2025-04-16T03:24:04.510Z

Link: CVE-2025-37730

cve-icon Vulnrichment

Updated: 2025-05-06T17:51:42.678Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-06T18:15:38.410

Modified: 2025-05-07T14:13:20.483

Link: CVE-2025-37730

cve-icon Redhat

No data.