Vulnerability Description
Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Elastic | Elastic Cloud On Kubernetes | < 1.1.0 |
Related Weaknesses (CWE)
References
- https://www.elastic.co/community/security/Vendor Advisory
- https://www.elastic.co/community/security/Vendor Advisory
FAQ
What is CVE-2020-7010?
CVE-2020-7010 is a vulnerability with a CVSS score of 7.5 (HIGH). Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deploy...
How severe is CVE-2020-7010?
CVE-2020-7010 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7010?
Check the references section above for vendor advisories and patch information. Affected products include: Elastic Elastic Cloud On Kubernetes.