CVE-2024-37287
Kibana vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2024-37287) was discovered in Kibana, affecting versions prior to 8.14.2 (8.x) and versions from 7.7.0 prior to 7.17.23 (7.x). The vulnerability allows arbitrary code execution through a prototype pollution vulnerability when an attacker has access to ML and Alerting connector features, as well as write access to internal ML indices. The vulnerability was disclosed on August 8, 2024, and received a CVSS score of 9.1 (Critical) (Elastic Discussion, ASEC Report).

Technical details

The vulnerability stems from prototype tainting flaws in Kibana's ML and Alerting connector. The exploitation requires specific privileges: write access to the .ml-anomalies* hidden indices, read access to the Machine Learning feature, and read access to the Actions & Connectors feature. The vulnerability has been classified under CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes) and CWE-94 (Improper Control of Generation of Code). The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H, indicating network accessibility with high privileges required (NVD, Elastic Discussion).

Impact

The vulnerability affects various Kibana deployment scenarios, including self-managed installations, Docker images, Elastic Cloud, Elastic Cloud Enterprise (ECE), and Elastic Cloud on Kubernetes (ECK). While containerized environments limit code execution within containers through seccomp-bpf and AppArmor profiles, self-managed Kibana installations on host Operating Systems are at highest risk. At the time of disclosure, approximately 5,183 exposed devices were observed online (Censys Report, Elastic Discussion).

Mitigation and workarounds

Elastic has released security updates to address this vulnerability. Users should upgrade to Kibana versions 8.14.2 or 7.17.23. For users unable to upgrade immediately, several mitigations are available: ensuring proper Elasticsearch and Kibana user privileges, disabling Connector Actions, and disabling ML capabilities. Additionally, administrators should verify that users have not been granted Elasticsearch index privileges to write ML result indices (.ml-anomalies*) (Elastic Discussion).

Additional resources


SourceThis report was generated using AI

Related Kibana vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-37735HIGH7
  • KibanaKibana
  • cpe:2.3:a:elastic:kibana
NoYesNov 06, 2025
CVE-2025-25017MEDIUM6.1
  • KibanaKibana
  • kibana
NoYesOct 10, 2025
CVE-2025-25018MEDIUM5.4
  • KibanaKibana
  • kibana
NoYesOct 10, 2025
CVE-2025-37728MEDIUM5.4
  • KibanaKibana
  • cpe:2.3:a:elastic:kibana
NoYesOct 07, 2025
CVE-2025-37734MEDIUM4.3
  • KibanaKibana
  • cpe:2.3:a:elastic:kibana
NoYesNov 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management