Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26939: CWE-862 Missing Authorization in Elastic Kibana

0
Medium
VulnerabilityCVE-2026-26939cvecve-2026-26939cwe-862
Published: Thu Mar 19 2026 (03/19/2026, 17:11:16 UTC)
Source: CVE Database V5
Vendor/Project: Elastic
Product: Kibana

Description

Missing Authorization (CWE-862) in Kibana’s server-side Detection Rule Management can lead to Unauthorized Endpoint Response Action Configuration (host isolation, process termination, and process suspension) via CAPEC-1 (Accessing Functionality Not Properly Constrained by ACLs). This requires an authenticated attacker with rule management privileges.

AI-Powered Analysis

AILast updated: 03/19/2026, 17:54:00 UTC

Technical Analysis

CVE-2026-26939 is a vulnerability categorized under CWE-862 (Missing Authorization) discovered in Elastic Kibana’s server-side Detection Rule Management component. The flaw arises because the system fails to properly enforce access control lists (ACLs) on certain endpoint response action configurations. Specifically, an attacker who is authenticated and has privileges to manage detection rules can exploit this vulnerability to perform unauthorized configurations of endpoint response actions, including host isolation, process termination, and process suspension. These actions are critical controls typically reserved for trusted administrators to contain or remediate threats on endpoints. The vulnerability leverages CAPEC-1, which involves accessing functionality not properly constrained by ACLs. The CVSS v3.1 base score is 6.5 (medium severity), reflecting that the attack vector is network-based with low attack complexity, requiring privileges but no user interaction, and impacting integrity without affecting confidentiality or availability. Affected versions include Kibana 8.0.0, 9.0.0, and 9.3.0. No patches or exploits are currently publicly available, but the vulnerability represents a significant risk in environments where detection rule management privileges are granted to multiple users or where privilege escalation is possible. The lack of authorization checks could allow malicious insiders or compromised accounts to disrupt endpoint security controls, undermining the security posture of the organization.

Potential Impact

The primary impact of CVE-2026-26939 is on the integrity of endpoint response actions managed through Kibana. Unauthorized configuration of host isolation, process termination, or suspension can disrupt normal endpoint operations, potentially causing denial of service to critical applications or isolating hosts unnecessarily. This could lead to operational disruptions, loss of trust in security monitoring systems, and increased risk of lateral movement or persistence by attackers if endpoint containment actions are improperly manipulated. Organizations relying on Kibana for security orchestration and automated response are at risk of having their response mechanisms subverted by attackers with rule management privileges. While confidentiality and availability impacts are limited, the integrity compromise can have cascading effects on incident response effectiveness and overall security posture. The vulnerability also raises concerns about insider threats and privilege misuse. Given Kibana’s widespread use in enterprise environments, the potential impact is global, affecting sectors such as finance, healthcare, government, and critical infrastructure where endpoint security is paramount.

Mitigation Recommendations

To mitigate CVE-2026-26939, organizations should first verify and restrict the assignment of detection rule management privileges to only trusted and necessary personnel, minimizing the attack surface. Implement strict role-based access controls (RBAC) within Kibana to ensure that only authorized users can configure endpoint response actions. Monitor and audit all changes to detection rules and endpoint response configurations to detect unauthorized modifications promptly. Until an official patch is released, consider isolating Kibana management interfaces behind strong network controls such as VPNs or zero-trust network access to limit exposure. Employ multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of credential compromise. Additionally, review and harden endpoint security policies to detect and alert on unusual host isolation or process termination events that could indicate exploitation attempts. Stay informed on Elastic’s security advisories for updates and apply patches immediately once available. Finally, conduct regular security training for administrators on the risks of privilege misuse and the importance of secure configuration management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
elastic
Date Reserved
2026-02-16T16:42:05.774Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc34d3e32a4fbe5fe2fcb9

Added to database: 3/19/2026, 5:39:31 PM

Last enriched: 3/19/2026, 5:54:00 PM

Last updated: 3/19/2026, 6:50:59 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses