CVE-2025-12149

N/A Unknown

📋 TL;DR

This vulnerability in Search Guard FLX allows unauthorized document access when searches are triggered from Signals watches. Document-Level Security (DLS) rules are bypassed, potentially exposing sensitive data. Organizations using Search Guard FLX versions 3.1.2 and earlier with Signals watches and DLS enabled are affected.

💻 Affected Systems

Products:
  • Search Guard FLX
Versions: 3.1.2 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using both Document-Level Security (DLS) and Signals watches functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all documents in queried indices to unauthorized users, potentially revealing sensitive business data, PII, or intellectual property.

🟠

Likely Case

Unauthorized users with access to Signals watches can view documents they shouldn't have permission to access, violating data segregation policies.

🟢

If Mitigated

Limited exposure if Signals watches are restricted to trusted users and monitored for unusual activity.

🌐 Internet-Facing: MEDIUM - Requires authenticated access to Signals watches, but could be exploited if watch endpoints are exposed.
🏢 Internal Only: HIGH - Internal users with watch access could exploit this to bypass document-level security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access to create or modify Signals watches.

Exploitation requires access to Signals watch functionality and knowledge of the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.3 or 4.0.0

Vendor Advisory: https://search-guard.com/cve-advisory/

Restart Required: Yes

Instructions:

1. Backup your Search Guard configuration. 2. Upgrade to Search Guard FLX 3.1.3 or 4.0.0. 3. Restart the Search Guard service. 4. Verify DLS enforcement works correctly with Signals watches.

🔧 Temporary Workarounds

Disable Signals watches

all

Temporarily disable Signals watches functionality to prevent exploitation.

Modify Search Guard configuration to disable Signals watches feature

Restrict watch creation

all

Limit who can create or modify Signals watches to trusted administrators only.

Adjust role-based access controls to restrict watch management permissions

🧯 If You Can't Patch

  • Implement strict access controls on Signals watches creation and modification
  • Monitor watch activity logs for unusual search patterns or unauthorized document access attempts

🔍 How to Verify

Check if Vulnerable:

Check if using Search Guard FLX version 3.1.2 or earlier with DLS and Signals watches enabled.

Check Version:

Check Search Guard FLX version in configuration files or via admin interface

Verify Fix Applied:

After patching, test that DLS rules are properly enforced when searches are triggered from Signals watches.

📡 Detection & Monitoring

Log Indicators:

  • Unusual watch-triggered search patterns
  • Access to documents outside user's DLS permissions via watch searches

Network Indicators:

  • Increased search traffic from watch endpoints
  • Unauthorized document retrieval patterns

SIEM Query:

Search for watch-triggered searches that return documents outside expected DLS scope

🔗 References

📤 Share & Export