CVE-2025-37730

EUVD-2025-13629
Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
elasticCNA
6.5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
elasticlogstash
8.0.0 ≤
𝑥
< 8.17.6
CNA
elasticlogstash
8.18.0 ≤
𝑥
< 8.18.1
CNA
elasticlogstash
9.0.0 ≤
𝑥
< 9.0.1
CNA