CVE-2024-52975

9.0 CRITICAL

📋 TL;DR

Fleet Server logs sensitive information from Fleet policies at INFO and ERROR log levels, potentially exposing credentials, API keys, or other confidential data. This affects all Elastic Fleet Server deployments with vulnerable versions where integrations containing sensitive data are configured.

💻 Affected Systems

Products:
  • Elastic Fleet Server
Versions: Versions before 8.15.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The specific sensitive information exposed depends on which integrations are enabled and configured in Fleet policies.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to log files containing credentials, API keys, or other sensitive data, leading to complete system compromise, data exfiltration, or lateral movement within the environment.

🟠

Likely Case

Unauthorized users with access to log files can extract sensitive information like API keys or configuration secrets, potentially enabling further attacks against integrated systems.

🟢

If Mitigated

With proper log access controls and monitoring, exposure is limited, but the vulnerability still creates unnecessary risk surface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to log files, which typically means some level of system access or log aggregation system compromise.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.15.0

Vendor Advisory: https://discuss.elastic.co/t/fleet-server-8-15-0-security-update-esa-2024-31/373522

Restart Required: Yes

Instructions:

1. Upgrade Fleet Server to version 8.15.0 or later. 2. Restart the Fleet Server service. 3. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict Log File Access

linux

Implement strict file permissions on Fleet Server log directories to prevent unauthorized access.

chmod 640 /var/log/fleet-server/*
chown root:fleet /var/log/fleet-server/*

Configure Log Redaction

all

Implement log filtering or redaction at the log aggregation layer to mask sensitive patterns.

🧯 If You Can't Patch

  • Implement strict access controls on log storage and monitoring systems
  • Regularly audit and rotate any credentials or API keys that may have been exposed in logs

🔍 How to Verify

Check if Vulnerable:

Check Fleet Server version: if below 8.15.0, system is vulnerable.

Check Version:

fleet-server --version

Verify Fix Applied:

Confirm Fleet Server version is 8.15.0 or higher and check logs no longer contain sensitive policy information.

📡 Detection & Monitoring

Log Indicators:

  • Fleet Server logs containing policy configuration with sensitive fields like passwords, tokens, or API keys

Network Indicators:

  • Unauthorized access attempts to log storage systems

SIEM Query:

source="fleet-server.log" AND ("password" OR "token" OR "api_key" OR "secret")

🔗 References

📤 Share & Export