CVE-2025-62371

7.4 HIGH

📋 TL;DR

OpenSearch Data Prepper versions before 2.12.2 have a vulnerability where OpenSearch sink and source plugins automatically trust all SSL certificates when no certificate path is configured. This bypasses SSL certificate validation, allowing man-in-the-middle attackers to intercept and modify data in transit. Users of Data Prepper who haven't explicitly configured certificate validation are affected.

💻 Affected Systems

Products:
  • OpenSearch Data Prepper
Versions: All versions prior to 2.12.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects OpenSearch sink and source plugins when cert parameter is not explicitly configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept, read, and modify all observability data flowing between Data Prepper and OpenSearch clusters, potentially injecting malicious data or stealing sensitive information.

🟠

Likely Case

Data integrity and confidentiality compromise in environments where attackers can perform man-in-the-middle attacks on network connections.

🟢

If Mitigated

No impact when proper certificate validation is configured or when connections are within trusted internal networks with additional security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires man-in-the-middle position on network path between Data Prepper and OpenSearch clusters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.12.2

Vendor Advisory: https://github.com/opensearch-project/data-prepper/security/advisories/GHSA-43ff-rr26-8hx4

Restart Required: Yes

Instructions:

1. Update Data Prepper to version 2.12.2 or later. 2. Restart Data Prepper services. 3. Verify connections are using proper SSL validation.

🔧 Temporary Workarounds

Configure certificate validation

all

Explicitly set the cert parameter in OpenSearch sink or source configuration with the path to the cluster's CA certificate.

Add 'cert: /path/to/ca-certificate.pem' to your OpenSearch sink/source configuration

🧯 If You Can't Patch

  • Ensure all Data Prepper to OpenSearch connections are within trusted internal networks with strict network segmentation
  • Implement additional network security controls like VPNs or TLS inspection to prevent man-in-the-middle attacks

🔍 How to Verify

Check if Vulnerable:

Check Data Prepper version and verify if cert parameter is configured in OpenSearch sink/source plugins.

Check Version:

data-prepper --version

Verify Fix Applied:

Confirm Data Prepper version is 2.12.2+ and verify SSL certificate validation is occurring for OpenSearch connections.

📡 Detection & Monitoring

Log Indicators:

  • SSL certificate validation warnings or errors
  • Unexpected connection resets to OpenSearch

Network Indicators:

  • Unencrypted or improperly validated TLS connections to OpenSearch clusters

SIEM Query:

source="data-prepper" AND ("cert" NOT IN config OR "ssl" IN log AND "validation" NOT IN log)

🔗 References

📤 Share & Export