This security bulletin contains one medium risk vulnerability.
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to secret token configuration is never applied when using ECK with APM Server. A remote non-authenticated attacker can send anonymous requests to an APM Server.
Install updates from vendor's website.Vulnerable software versions
Elastic Cloud on Kubernetes: 0.8 - 2.7Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?