Critical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution
Elastic has issued a critical security advisory about two severe vulnerabilities in Kibana, its popular data visualization and analytics platform.
CVE-2024-37288: YAML Deserialization Flaw in Amazon Bedrock Connector.
Rated as critical with a CVSS score of 9.9, this flaw can lead to remote code execution through crafted malicious YAML payloads. Users who have configured an Amazon Bedrock connector in Elastic Security should update immediately.
CVE-2024-37285: Widespread YAML Deserialization Vulnerability.
With a CVSS score of 9.1, this vulnerability affects a broader range of Kibana users. It allows attackers to execute arbitrary code if they have specific Elasticsearch and Kibana privileges.
What’s the solution?
Elastic advises all users to upgrade to Kibana version 8.15.1 to address these vulnerabilities. For those unable to upgrade immediately, temporarily disable the integration assistant using the following configuration:
xpack.integration_assistant.enabled: false
Act now to protect your systems. Vulnerabilities like these can lead to complete system compromise if left unaddressed.