Description
Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
Scores
CVSS v3
6.5
EPSS
0.0009
EPSS Percentile
25.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-295
Status
published
Products (3)
Elastic/Logstash
8.0.0 - 8.17.6
Elastic/Logstash
8.18.0 - 8.18.1
Elastic/Logstash
9.0.0 - 9.0.1
Published
May 06, 2025
Tracked Since
Feb 18, 2026