Malicious code vulnerabilities jeopardize Kibana visualization platform

A security update closes two critical vulnerabilities in Kibana.

Save to Pocket listen Print view
Button for an update

(Image: Photon photo/Shutterstock.com)

1 min. read

The Kibana analysis and visualization platform is vulnerable. Attackers can exploit two vulnerabilities and use them to push malicious code onto systems and execute it. A secured version is available for download.

A "critical" vulnerability (CVE-2024-37288) threatens Kibana 8.15.0. Because errors occur when processing data in a YAML document, attackers can execute malicious code. In a warning message, the developers assure that they have closed the gap in version 8.15.1.

If admins are unable to install the security update immediately, there is a temporary alternative to protect PCs from such attacks. To do this, they must make the setting xpack.integration_assistant.enabled: false in the configuration file kibana.yml.

The security problem is identical for the second"critical" vulnerability (CVE-2024-37285). However, attackers must fulfill several requirements for a successful attack and, for example, allow_restricted_indices flag must be set to true.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.