cve/2018/CVE-2018-3825.md

18 lines
953 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-3825](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3825)
![](https://img.shields.io/static/v1?label=Product&message=Elastic%20Cloud%20Enterprise%20(ECE)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key&color=brighgreen)
### Description
In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 a default master encryption key is used in the process of granting ZooKeeper access to Elasticsearch clusters. Unless explicitly overwritten, this master key is predictable across all ECE deployments. If an attacker can connect to ZooKeeper directly they would be able to access configuration information of other tenants if their cluster ID is known.
### POC
#### Reference
- https://www.elastic.co/community/security
#### Github
No PoCs found on GitHub currently.