CVE-2024-37288

Sept. 9, 2024, 1:03 p.m.

Undergoing Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Kibana

Source

bressers@elastic.co

Tags

CVE-2024-37288 details

Published : Sept. 9, 2024, 9:15 a.m.
Last Modified : Sept. 9, 2024, 1:03 p.m.

Description

A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .

CVSS Score

1 2 3 4 5 6 7 8 9.9 10

Weakness

Weakness Name Description
CWE-502 Deserialization of Untrusted Data The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score

9.9

Exploitability Score

3.1

Impact Score

6.0

Base Severity

CRITICAL

This website uses the NVD API, but is not approved or certified by it.