CVE-2025-37730

Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
Configurations

No configuration.

History

07 May 2025, 14:13

Type Values Removed Values Added
Summary
  • (es) Una validación incorrecta del certificado en la salida TCP de Logstash podría provocar un ataque de intermediario (MitM) en modo “client”, ya que no se estaba realizando la verificación del nombre de host en la salida TCP cuando se configuraba ssl_verification_mode => full.

06 May 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-06 18:15

Updated : 2025-05-07 14:13


NVD link : CVE-2025-37730

Mitre link : CVE-2025-37730

CVE.ORG link : CVE-2025-37730


JSON object : View

Products Affected

No product.

CWE
CWE-295

Improper Certificate Validation