CVE-2025-37728

5.4 MEDIUM

📋 TL;DR

This vulnerability allows a malicious user with access to a Kibana space to create a Crowdstrike connector and retrieve cached credentials from other spaces. It affects Kibana instances with the Crowdstrike connector enabled where multiple spaces exist.

💻 Affected Systems

Products:
  • Elastic Kibana
Versions: 8.18.0 to 8.18.7, 8.19.0 to 8.19.4, 9.0.0 to 9.0.7, 9.1.0 to 9.1.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Crowdstrike connector to be configured and multiple Kibana spaces to exist.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal Crowdstrike API credentials, potentially gaining unauthorized access to Crowdstrike security data and systems.

🟠

Likely Case

Internal users with space access could inadvertently or intentionally access credentials from other spaces, leading to credential exposure.

🟢

If Mitigated

With proper space isolation and access controls, only authorized users could access their own space credentials.

🌐 Internet-Facing: MEDIUM - If Kibana is internet-facing, attackers could exploit this if they gain authenticated access.
🏢 Internal Only: MEDIUM - Internal users with space access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to a Kibana space and knowledge of the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.18.8, 8.19.5, 9.0.8, 9.1.5

Vendor Advisory: https://discuss.elastic.co/t/kibana-crowdstrike-connector-8-18-8-8-19-5-9-0-8-and-9-1-5-security-update-esa-2025-19/382455

Restart Required: Yes

Instructions:

1. Identify your Kibana version. 2. Upgrade to the patched version matching your major release. 3. Restart Kibana service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Crowdstrike Connector

all

Temporarily disable the Crowdstrike connector if not essential.

# Kibana configuration - set xpack.actions.preconfigured to exclude Crowdstrike

Restrict Space Access

all

Limit user access to only necessary spaces to reduce attack surface.

# Use Kibana role-based access control to restrict space permissions

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can create connectors in spaces.
  • Monitor for unusual connector creation activities and audit space access logs regularly.

🔍 How to Verify

Check if Vulnerable:

Check Kibana version via Kibana UI (Management > Stack Management > License Management) or API GET /api/status.

Check Version:

curl -X GET 'http://localhost:5601/api/status' -H 'kbn-xsrf: true'

Verify Fix Applied:

Confirm version is 8.18.8, 8.19.5, 9.0.8, or 9.1.5 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Crowdstrike connector creation events
  • Multiple failed credential access attempts across spaces

Network Indicators:

  • Unexpected API calls to Crowdstrike endpoints from Kibana

SIEM Query:

source:kibana AND ("connector created" OR "crowdstrike") AND action:space_access

🔗 References

📤 Share & Export