EUVD-2024-54667

| CVE-2024-43706 HIGH
2025-06-10 [email protected]
7.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2024-54667
CVE Published
Jun 10, 2025 - 17:19 nvd
HIGH 7.6

Description

Improper authorization in Kibana can lead to privilege abuse via a direct HTTP request to a Synthetic monitor endpoint.

Analysis

CVE-2024-43706 is an improper authorization vulnerability in Kibana's Synthetic monitor endpoint that allows authenticated users to escalate privileges through direct HTTP requests. Attackers with low-level credentials can bypass access controls to perform unauthorized actions on synthetic monitoring functionality, potentially affecting confidentiality, integrity, and availability. While the CVSS 7.6 score indicates significant risk, real-world impact depends on deployment context and whether this vulnerability is actively exploited in the wild.

Technical Context

This vulnerability exists in Kibana's Synthetic Monitoring module, which is part of the Elastic Stack used for synthetic uptime and performance monitoring. The root cause is CWE-285 (Improper Authorization), indicating insufficient access control checks on HTTP endpoints designated for synthetic monitor operations. Rather than enforcing proper Role-Based Access Control (RBAC) or attribute-based access controls, the endpoint likely validates authentication (that a user exists) but fails to validate that the authenticated user has appropriate privileges to interact with synthetic monitors. This is a common pattern where authentication is conflated with authorization. The vulnerability is accessible via direct HTTP requests to the endpoint, meaning no special tooling or complex exploitation technique is required—standard HTTP clients suffice. The low attack complexity (AC:L) confirms this.

Affected Products

Kibana (Elastic Stack component) is the primary affected product. Specific affected versions are not provided in the available data; however, CVE-2024-43706 likely affects recent versions of Kibana released in 2024. CPE format would be: cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*. Organizations should consult Elastic's official security advisory for exact version ranges (e.g., 8.x versions prior to a specific patch release). The vulnerability is specific to instances with Synthetic Monitoring enabled and configured. Vendor advisory: Consult https://www.elastic.co/security or Elastic's official CVE advisory for definitive version information and patching guidance.

Remediation

1. **Immediate Patch**: Upgrade Kibana to the patched version published by Elastic for CVE-2024-43706 (version specifics should be obtained from Elastic's official advisory). 2. **Interim Mitigation**: Restrict network access to Kibana's Synthetic monitor endpoints at the firewall/load-balancer level, limiting HTTP requests to trusted source IPs. 3. **Access Control Review**: Audit user role assignments in Kibana; ensure low-privilege users do not have synthetic monitoring privileges if not required. Implement principle of least privilege strictly. 4. **Monitoring**: Enable audit logging on Kibana API endpoints to detect unauthorized synthetic monitor access attempts. Monitor for unusual API calls to synthetic endpoints from low-privilege users. 5. **Workaround** (if patching is delayed): Disable or restrict Synthetic Monitoring features in Kibana if not in active use, via configuration settings in kibana.yml.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Vendor Status

Debian

Bug #700337
kibana
Release Status Fixed Version Urgency
open - -

Share

EUVD-2024-54667 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy