Elastic

Elastic

A critical vulnerability (CVE-2025-37728) was discovered in Elastic’s **Kibana CrowdStrike Connector**, where insufficient credential isolation in a shared cache allowed authenticated attackers across different Kibana spaces to access stored **CrowdStrike API keys**. While the flaw does not enable direct data modification or deletion, leaked credentials could be abused to query CrowdStrike APIs, exfiltrate sensitive **threat intelligence data**, and potentially disrupt **incident response workflows**. The vulnerability affects multiple Kibana versions (7.x, 8.x, early 9.x) and was rated **Medium severity (CVSS 3.1: 5.4)**, requiring limited privileges and user interaction. Elastic released patches (8.18.8, 8.19.5, 9.0.8, 9.1.5) and urged immediate upgrades, as no workarounds exist. Organizations were advised to **rotate exposed API keys**, review access controls, and monitor connector health to prevent exploitation. Failure to patch risks unauthorized access to **security-critical APIs**, compromising operational integrity and threat detection capabilities.

Source: https://cyberpress.org/kibana-crowdstrike-connector-vulnerability/

TPRM report: https://www.rankiteo.com/company/elastic-co

"id": "ela3593435100725",
"linkid": "elastic-co",
"type": "Vulnerability",
"date": "6/2025",
"severity": "50",
"impact": "2",
"explanation": "Attack limited on finance or reputation"
{'affected_entities': [{'industry': ['Technology',
                                     'Cybersecurity',
                                     'IT Operations'],
                        'location': 'Global',
                        'name': 'Elastic (Kibana Users)',
                        'type': ['Software Vendor', 'Enterprise Users']}],
 'attack_vector': ['Improper Access Control',
                   'Insufficient Credential Isolation',
                   'Shared Cache Exploitation'],
 'customer_advisories': ['Verify Kibana versions, apply patches, and rotate '
                         'CrowdStrike API keys'],
 'data_breach': {'data_exfiltration': ['Potential (if credentials are abused)'],
                 'sensitivity_of_data': 'High (CrowdStrike API keys enable '
                                        'threat intelligence access)',
                 'type_of_data_compromised': ['API Credentials']},
 'description': 'A critical security issue in the Kibana CrowdStrike Connector '
                '(CVE-2025-37728) allows attackers to access stored '
                'CrowdStrike credentials across different spaces within the '
                'same deployment. The flaw stems from insufficient protection '
                'of credentials cached when the connector is created in one '
                'workspace, enabling malicious users with access to any other '
                'space in the same Kibana instance to retrieve cached '
                'credentials belonging to a different space. While no direct '
                'data modification or deletion is possible, leaked credentials '
                'can enable attackers to query CrowdStrike APIs, gather '
                'sensitive threat intelligence, and potentially manipulate '
                'incident response workflows.',
 'impact': {'brand_reputation_impact': ['Potential reputational damage due to '
                                        'credential leakage'],
            'data_compromised': ['CrowdStrike API Credentials'],
            'operational_impact': ['Potential disruption to threat '
                                   'intelligence workflows',
                                   'Incident response process manipulation '
                                   'risk'],
            'systems_affected': ['Kibana (with CrowdStrike Connector)']},
 'investigation_status': 'Resolved (Patches released; user action required)',
 'lessons_learned': ['Importance of credential isolation in multi-tenant '
                     'environments',
                     'Need for timely patch management to mitigate known '
                     'vulnerabilities',
                     'Criticality of rotating exposed credentials '
                     'post-incident',
                     'Value of monitoring access controls across shared '
                     'spaces'],
 'motivation': ['Unauthorized Access',
                'Credential Theft',
                'Threat Intelligence Gathering',
                'Incident Response Manipulation'],
 'post_incident_analysis': {'corrective_actions': ['Patched Kibana versions '
                                                   'enforce proper credential '
                                                   'isolation',
                                                   'Users must upgrade and '
                                                   'rotate exposed keys'],
                            'root_causes': ['Insufficient isolation controls '
                                            'in Kibana’s shared credential '
                                            'cache',
                                            'Lack of workspace-specific access '
                                            'restrictions for cached '
                                            'credentials']},
 'recommendations': ['Upgrade Kibana to patched versions (8.18.8, 8.19.5, '
                     '9.0.8, 9.1.5) immediately',
                     'Rotate all CrowdStrike API keys potentially exposed '
                     'prior to patching',
                     'Review and harden access controls for Kibana spaces',
                     'Implement least-privilege principles for connector '
                     'configurations',
                     'Monitor for anomalous CrowdStrike API activity',
                     'Subscribe to Elastic’s security advisories for proactive '
                     'updates'],
 'references': [{'source': 'Elastic Security Advisory'},
                {'source': 'CVE-2025-37728 Details'}],
 'response': {'containment_measures': ['Immediate upgrade to patched Kibana '
                                       'versions (8.18.8, 8.19.5, 9.0.8, '
                                       '9.1.5)'],
              'enhanced_monitoring': ['Monitor for unauthorized CrowdStrike '
                                      'API queries'],
              'recovery_measures': ['Monitor Elastic’s security announcements '
                                    'for updates'],
              'remediation_measures': ['Rotate exposed CrowdStrike API keys',
                                       'Review CrowdStrike Connector '
                                       'configurations post-upgrade',
                                       'Engage security teams to verify '
                                       'connector health',
                                       'Review access controls across Kibana '
                                       'spaces']},
 'stakeholder_advisories': ['Elastic urges immediate upgrades and credential '
                            'rotation'],
 'title': 'CVE-2025-37728: Kibana CrowdStrike Connector Credential Leak '
          'Vulnerability',
 'type': ['Vulnerability', 'Credential Disclosure', 'Information Leak'],
 'vulnerability_exploited': 'CVE-2025-37728 (Insufficient protection of '
                            'CrowdStrike Connector credentials in shared '
                            'cache)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.