A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
History

Tue, 17 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:elastic:kibana:-:*:*:*:*:*:*:* cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:elastic:kibana:-:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Sep 2024 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Elastic
Elastic kibana
CPEs cpe:2.3:a:elastic:kibana:8.15.0:*:*:*:*:*:*:*
Vendors & Products Elastic
Elastic kibana

Mon, 09 Sep 2024 08:45:00 +0000

Type Values Removed Values Added
Description A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published: 2024-09-09T08:29:51.918Z

Updated: 2024-09-17T13:04:21.866Z

Reserved: 2024-06-05T14:21:14.942Z

Link: CVE-2024-37288

cve-icon Vulnrichment

Updated: 2024-09-09T13:07:37.106Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-09T09:15:02.183

Modified: 2024-09-16T13:29:06.023

Link: CVE-2024-37288

cve-icon Redhat

No data.