CVE-2024-37282
📋 TL;DR
This vulnerability allows API keys with specific privileges to create new API keys with elevated privileges, leading to privilege escalation. It affects Elastic Cloud Enterprise deployments where API key management is enabled. Attackers could gain unauthorized administrative access to the Elastic environment.
💻 Affected Systems
- Elastic Cloud Enterprise
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full administrative compromise of Elastic Cloud Enterprise deployment, allowing data exfiltration, service disruption, and lateral movement within the environment.
Likely Case
Privilege escalation leading to unauthorized access to sensitive data and configuration manipulation.
If Mitigated
Limited impact with proper API key monitoring and least privilege principles in place.
🎯 Exploit Status
Exploitation requires an existing API key with specific privileges to create new keys.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.7.2
Vendor Advisory: https://discuss.elastic.co/t/elastic-cloud-enterprise-3-7-2-security-update-esa-2024-18/362181
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Upgrade Elastic Cloud Enterprise to version 3.7.2. 3. Restart all ECE services. 4. Verify upgrade completion and functionality.
🔧 Temporary Workarounds
Restrict API Key Creation
allTemporarily disable or restrict API key creation capabilities.
ece configure --api-keys-enabled=false
Audit Existing API Keys
allReview and revoke unnecessary API keys, especially those with key creation privileges.
ece api-keys list
ece api-keys revoke <key_id>
🧯 If You Can't Patch
- Implement strict API key monitoring and alerting for unusual key creation patterns.
- Apply network segmentation to restrict API access to trusted sources only.
🔍 How to Verify
Check if Vulnerable:
Check current ECE version: ece version | grep -i version
Check Version:
ece version
Verify Fix Applied:
Verify version is 3.7.2 or higher: ece version
📡 Detection & Monitoring
Log Indicators:
- Unusual API key creation patterns
- Multiple API key creation events from single source
- API key creation with elevated privileges
Network Indicators:
- Increased API calls to key creation endpoints
- Unusual source IPs accessing key management APIs
SIEM Query:
source="ece-logs" AND ("api-key" AND "create") | stats count by src_ip, user