Description
Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
Published: 2020-06-03
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vfp4-xx6m-7vf6 Cryptographic Issues in ECK
References
History

Mon, 18 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Elastic Elastic Cloud On Kubernetes
cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2024-11-18T17:29:12.007Z

Reserved: 2020-01-14T00:00:00.000Z

Link: CVE-2020-7010

cve-icon Vulnrichment

Updated: 2024-08-04T09:18:02.494Z

cve-icon NVD

Status : Modified

Published: 2020-06-03T18:15:22.697

Modified: 2024-11-21T05:36:29.217

Link: CVE-2020-7010

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses