CVE-2024-23443

4.9 MEDIUM

📋 TL;DR

This vulnerability allows high-privileged Kibana users with osquery pack creation permissions to upload malicious packs that could cause Kibana availability issues through resource exhaustion. It affects Kibana instances where users have been granted osquery pack management privileges.

💻 Affected Systems

Products:
  • Kibana
Versions: Kibana versions before 8.14.0, 7.17.22
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when users have been explicitly granted osquery pack creation permissions. Default configurations restrict this to administrators.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious insider or compromised high-privileged account could upload a specially crafted osquery pack that causes Kibana to become unresponsive or crash, disrupting monitoring and visualization capabilities.

🟠

Likely Case

Accidental or intentional upload of poorly designed osquery packs that consume excessive resources, leading to Kibana performance degradation or temporary unavailability.

🟢

If Mitigated

Minimal impact with proper privilege management and monitoring in place, as only authorized users could trigger the issue and it would be quickly detected.

🌐 Internet-Facing: MEDIUM - If Kibana is internet-facing and high-privileged accounts are exposed, attackers could potentially exploit this after credential compromise.
🏢 Internal Only: MEDIUM - Insider threat or compromised internal accounts with osquery pack permissions could affect Kibana availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access with osquery pack creation privileges. Exploitation involves uploading a malicious pack file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kibana 8.14.0, 7.17.22

Vendor Advisory: https://discuss.elastic.co/t/kibana-8-14-0-7-17-22-security-update-esa-2024-11/361460

Restart Required: Yes

Instructions:

1. Backup Kibana configuration and data. 2. Download patched version from Elastic website. 3. Stop Kibana service. 4. Install updated version. 5. Restart Kibana service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict osquery pack permissions

all

Remove osquery pack creation permissions from non-essential users

Review and modify Kibana role-based access control (RBAC) to restrict 'osquery:write' permissions

Implement pack validation

all

Add validation for uploaded osquery packs before deployment

Implement custom validation scripts or use Kibana API to review packs before activation

🧯 If You Can't Patch

  • Implement strict least-privilege access control for osquery pack management
  • Monitor for unusual osquery pack uploads and resource consumption patterns

🔍 How to Verify

Check if Vulnerable:

Check Kibana version and verify if users have osquery pack creation permissions

Check Version:

curl -X GET "localhost:5601/api/status" | grep "version"

Verify Fix Applied:

Confirm Kibana version is 8.14.0+ or 7.17.22+ and test osquery pack functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual osquery pack uploads
  • Kibana process resource exhaustion logs
  • Error logs related to pack processing

Network Indicators:

  • Increased API calls to osquery pack endpoints
  • Unusual traffic patterns to Kibana

SIEM Query:

source="kibana.log" AND ("osquery pack" OR "pack upload") AND (error OR warning OR "resource exhaustion")

🔗 References

📤 Share & Export