Kibana Insufficiently Protected Credentials in the CrowdStrike Connector (ESA-2025-19)
Insufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from an Elastic Crowdstrike connector in another space by creating and running a Crowdstrike connector in a space to which they have access.
Affected Versions:
- 7.x: All versions prior to and including 7.17.29
- 8.x: All versions from 8.14.0 and up to and including 8.18.7
- 8.19.x: All versions from 8.19.0 and up to and including 8.19.4
- 9.0.x: All versions from 9.0.0 and up to and including 9.0.7
- 9.1.x: All versions from 9.1.0 and up to and including 9.1.4
Affected Configurations:
Kibana instances using the CrowdStrike Connector
Solutions and Mitigations:
The issue is resolved in versions 8.18.8 or 8.19.5 or 9.0.8 or 9.1.5.
For Users that Cannot Upgrade:
There are no workarounds
Severity: CVSSv3.1: Medium (5.4) CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVE ID: CVE-2025-37728