CVE-2025-37730

MEDIUM

Logstash - SSL Validation

Title source: llm
STIX 2.1

Description

Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.

Scores

CVSS v3 6.5
EPSS 0.0009
EPSS Percentile 25.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-295
Status published
Products (3)
Elastic/Logstash 8.0.0 - 8.17.6
Elastic/Logstash 8.18.0 - 8.18.1
Elastic/Logstash 9.0.0 - 9.0.1
Published May 06, 2025
Tracked Since Feb 18, 2026