CVE-2025-37728: CWE-522 Insufficiently Protected Credentials in Elastic Kibana
Insufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from a Crowdstrike connector in another space by creating and running a Crowdstrike connector in a space to which they have access.
AI Analysis
Technical Summary
CVE-2025-37728 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) found in Elastic Kibana's Crowdstrike connector component. The flaw allows an attacker with limited privileges (PR:L) and requiring user interaction (UI:R) to access cached Crowdstrike credentials belonging to other spaces within the same Kibana instance. Specifically, a malicious user who can create and run a Crowdstrike connector in a space they have access to can retrieve credentials cached from other spaces, breaching the intended isolation between spaces. This vulnerability affects multiple Kibana versions, including 7.0.0, 8.14.0, 8.19.0, 9.0.0, and 9.1.0. The CVSS v3.1 score is 5.4 (medium), reflecting network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), user interaction required (UI:R), and a scope change (S:C) with limited confidentiality and integrity impacts (C:L, I:L), and no availability impact (A:N). The vulnerability arises from insufficient credential protection mechanisms in the Crowdstrike connector, leading to potential credential leakage across spaces, which could enable further lateral movement or escalation if exploited. No public exploits have been reported yet, but the vulnerability's presence in widely used Kibana versions and the sensitivity of Crowdstrike credentials make it a significant concern.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality of Crowdstrike credentials used within Elastic Kibana environments. Exposure of these credentials could allow attackers to impersonate legitimate Crowdstrike integrations, potentially leading to unauthorized access to endpoint detection and response data or manipulation of security telemetry. This could undermine incident detection and response capabilities, increasing the risk of undetected breaches. Organizations with multi-tenant Kibana deployments or those using spaces to segregate teams or departments are particularly vulnerable, as the flaw allows cross-space credential leakage. The impact is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, common across Europe. While no availability or integrity impacts are directly associated, the compromise of credentials can lead to broader security incidents. The medium severity rating indicates a moderate risk but should not be underestimated given the strategic importance of Crowdstrike credentials in security operations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict access controls to Kibana spaces, ensuring that only trusted users can create or run Crowdstrike connectors. 2) Implement strict role-based access control (RBAC) policies to minimize privilege levels, especially limiting the ability to create connectors across spaces. 3) Monitor and audit Crowdstrike connector usage and access logs to detect unusual activity or unauthorized attempts to create connectors. 4) Segregate sensitive environments and consider isolating Crowdstrike connectors to dedicated spaces with minimal user access. 5) Apply any patches or updates released by Elastic promptly once available, as the current information indicates no patch links yet. 6) Educate administrators and users about the risks of credential leakage and enforce strong credential management practices, including regular rotation of Crowdstrike credentials. 7) Consider additional network segmentation and monitoring around Kibana instances to detect lateral movement attempts leveraging leaked credentials.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Finland
CVE-2025-37728: CWE-522 Insufficiently Protected Credentials in Elastic Kibana
Description
Insufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from a Crowdstrike connector in another space by creating and running a Crowdstrike connector in a space to which they have access.
AI-Powered Analysis
Technical Analysis
CVE-2025-37728 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) found in Elastic Kibana's Crowdstrike connector component. The flaw allows an attacker with limited privileges (PR:L) and requiring user interaction (UI:R) to access cached Crowdstrike credentials belonging to other spaces within the same Kibana instance. Specifically, a malicious user who can create and run a Crowdstrike connector in a space they have access to can retrieve credentials cached from other spaces, breaching the intended isolation between spaces. This vulnerability affects multiple Kibana versions, including 7.0.0, 8.14.0, 8.19.0, 9.0.0, and 9.1.0. The CVSS v3.1 score is 5.4 (medium), reflecting network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), user interaction required (UI:R), and a scope change (S:C) with limited confidentiality and integrity impacts (C:L, I:L), and no availability impact (A:N). The vulnerability arises from insufficient credential protection mechanisms in the Crowdstrike connector, leading to potential credential leakage across spaces, which could enable further lateral movement or escalation if exploited. No public exploits have been reported yet, but the vulnerability's presence in widely used Kibana versions and the sensitivity of Crowdstrike credentials make it a significant concern.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality of Crowdstrike credentials used within Elastic Kibana environments. Exposure of these credentials could allow attackers to impersonate legitimate Crowdstrike integrations, potentially leading to unauthorized access to endpoint detection and response data or manipulation of security telemetry. This could undermine incident detection and response capabilities, increasing the risk of undetected breaches. Organizations with multi-tenant Kibana deployments or those using spaces to segregate teams or departments are particularly vulnerable, as the flaw allows cross-space credential leakage. The impact is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, common across Europe. While no availability or integrity impacts are directly associated, the compromise of credentials can lead to broader security incidents. The medium severity rating indicates a moderate risk but should not be underestimated given the strategic importance of Crowdstrike credentials in security operations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict access controls to Kibana spaces, ensuring that only trusted users can create or run Crowdstrike connectors. 2) Implement strict role-based access control (RBAC) policies to minimize privilege levels, especially limiting the ability to create connectors across spaces. 3) Monitor and audit Crowdstrike connector usage and access logs to detect unusual activity or unauthorized attempts to create connectors. 4) Segregate sensitive environments and consider isolating Crowdstrike connectors to dedicated spaces with minimal user access. 5) Apply any patches or updates released by Elastic promptly once available, as the current information indicates no patch links yet. 6) Educate administrators and users about the risks of credential leakage and enforce strong credential management practices, including regular rotation of Crowdstrike credentials. 7) Consider additional network segmentation and monitoring around Kibana instances to detect lateral movement attempts leveraging leaked credentials.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- elastic
- Date Reserved
- 2025-04-16T03:24:04.510Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e51d0ca677756fc991120e
Added to database: 10/7/2025, 2:00:44 PM
Last enriched: 10/7/2025, 2:15:59 PM
Last updated: 10/9/2025, 4:21:39 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59968: CWE‑862: Missing Authorization in Juniper Networks Junos Space Security Director
HighCVE-2025-59967: CWE-476: NULL Pointer Dereference in Juniper Networks Junos OS Evolved
MediumCVE-2025-59976: CWE-552 Files or Directories Accessible to External Parties in Juniper Networks Junos Space
MediumCVE-2025-59975: CWE-400 Uncontrolled Resource Consumption in Juniper Networks Junos Space
HighCVE-2025-59974: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Juniper Networks Junos Space Security Director
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.