CVE-2023-49922
MEDIUMElastic Beats < 7.17.16 - Log Information Exposure
Title source: ruleDescription
An issue was discovered by Elastic whereby Beats and Elastic Agent would log a raw event in its own logs at the WARN or ERROR level if ingesting that event to Elasticsearch failed with any 4xx HTTP status code except 409 or 429. Depending on the nature of the event that Beats or Elastic Agent attempted to ingest, this could lead to the insertion of sensitive or private information in the Beats or Elastic Agent logs. Elastic has released 8.11.3 and 7.17.16 that prevents this issue by limiting these types of logs to DEBUG level logging, which is disabled by default.
References (1)
Core 1
Core References
Mitigation, Vendor Advisory
https://discuss.elastic.co/t/beats-and-elastic-agent-8-11-3-7-17-16-security-update-esa-2023-30/349180
Scores
CVSS v3
6.8
EPSS
0.0044
EPSS Percentile
63.4%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-532
Status
published
Products (3)
elastic/beats
7.0.0 - 7.17.16Go
elastic/beats
8.0.0 - 8.11.3Go
elastic/elastic_beats
7.0.0 - 7.17.16
Published
Dec 12, 2023
Tracked Since
Feb 18, 2026