Vulnerability Description
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Elastic | Kibana | 8.15.0 |
Related Weaknesses (CWE)
References
- https://discuss.elastic.co/t/kibana-8-15-1-security-update-esa-2024-27-esa-2024-MitigationVendor Advisory
FAQ
What is CVE-2024-37288?
CVE-2024-37288 is a vulnerability with a CVSS score of 9.9 (CRITICAL). A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Secur...
How severe is CVE-2024-37288?
CVE-2024-37288 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-37288?
Check the references section above for vendor advisories and patch information. Affected products include: Elastic Kibana.