CVE-2025-37730
Logstash vulnerability analysis and mitigation

Overview

Improper certificate validation in Logstash's TCP output was discovered on May 6, 2025, affecting all versions prior to 8.17.6, as well as versions 8.18.0 and 9.0.0. The vulnerability occurs when the TCP output is running in 'client' mode, where hostname verification was not being performed even when sslverificationmode => full was set (Wiz Report).

Technical details

The vulnerability is tracked as CVE-2025-37730 and has been assigned a CVSS v3.1 score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N. The issue specifically affects the TCP output plugin when run in 'client' mode with sslverificationmode => full set, which is the default configuration (Wiz Report).

Impact

The vulnerability could allow attackers to perform man-in-the-middle (MitM) attacks due to improper certificate validation in the TCP output functionality. This could potentially lead to unauthorized access to sensitive information and limited integrity compromise of the affected systems (NVD).

Mitigation and workarounds

Users are advised to upgrade to version 8.17.6, 8.18.1, or 9.0.1 to resolve the issue. Alternatively, users can upgrade the TCP output plugin to version 6.2.2 or 7.0.1 by running bin/logstash-plugin update logstash-output-tcp (Wiz Report).

Additional resources


SourceThis report was generated using AI

Related Logstash vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-34158HIGH7.5
  • cAdvisorcAdvisor
  • vertical-pod-autoscaler-fips
NoYesSep 06, 2024
CVE-2024-34156HIGH7.5
  • cAdvisorcAdvisor
  • openshift4::ose-console-rhel9-operator@sha256:514ab7310f840027dc2609b10fa465eb6282c11d110f3d69efcf21ea5ef63ec9_amd64
NoYesSep 06, 2024
CVE-2025-37730MEDIUM6.5
  • LogstashLogstash
  • cpe:2.3:a:elastic:logstash
NoYesMay 06, 2025
CVE-2024-45614MEDIUM5.4
  • RubyRuby
  • gitlab-cng-18.1
NoYesSep 19, 2024
CVE-2024-34155MEDIUM4.3
  • cAdvisorcAdvisor
  • openshift4::ose-cluster-openshift-controller-manager-operator@sha256:607625ef386d14174db357c861e177936216cf3be583686e5c03c1a6edd3c12d_s390x
NoYesSep 06, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management