Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
References
History

Mon, 18 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published: 2020-06-03T17:55:42

Updated: 2024-11-18T17:29:12.007Z

Reserved: 2020-01-14T00:00:00

Link: CVE-2020-7010

cve-icon Vulnrichment

Updated: 2024-08-04T09:18:02.494Z

cve-icon NVD

Status : Modified

Published: 2020-06-03T18:15:22.697

Modified: 2024-11-21T05:36:29.217

Link: CVE-2020-7010

cve-icon Redhat

No data.