Improper Certificate Validation in Logstash by Elastic
CVE-2025-37730

6.5MEDIUM

Key Information:

Vendor

Elastic

Status
Vendor
CVE Published:
6 May 2025

What is CVE-2025-37730?

A vulnerability in Logstash's TCP output configuration allows attackers to execute man-in-the-middle (MitM) attacks due to inadequate hostname verification. When the 'ssl_verification_mode' is set to 'full', the absence of proper certificate validation can expose sensitive data as it traverses the network. This issue affects multiple versions of Logstash, making it critical for users to update to secure their deployments against potential exploitation.

Affected Version(s)

Logstash 8.0.0 < 8.17.6

Logstash 8.18.0 < 8.18.1

Logstash 9.0.0 < 9.0.1

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-37730 : Improper Certificate Validation in Logstash by Elastic