CVE-2025-37730Improper Certificate Validation in Logstash

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 74.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 6

Description

Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:NExploitability: 2.2 | Impact: 4.2

Affected Packages1 packages

CVEListV5elastic/logstash8.0.08.17.6+2

🔴Vulnerability Details

2
GHSA
GHSA-qrf7-ph5v-mj2v: Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in2025-05-06
CVEList
Logstash Improper Certificate Validation in TCP output2025-05-06
CVE-2025-37730 — Improper Certificate Validation | cvebase