Kibana - Crowdstrike Connector 8.18.8, 8.19.5, 9.0.8, and 9.1.5 Security Update (ESA-2025-19)

Kibana Insufficiently Protected Credentials in the CrowdStrike Connector (ESA-2025-19)

Insufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from an Elastic Crowdstrike connector in another space by creating and running a Crowdstrike connector in a space to which they have access.

Affected Versions:

  • 7.x: All versions prior to and including 7.17.29
  • 8.x: All versions from 8.14.0 and up to and including 8.18.7
  • 8.19.x: All versions from 8.19.0 and up to and including 8.19.4
  • 9.0.x: All versions from 9.0.0 and up to and including 9.0.7
  • 9.1.x: All versions from 9.1.0 and up to and including 9.1.4

Affected Configurations:

Kibana instances using the CrowdStrike Connector

Solutions and Mitigations:

The issue is resolved in versions 8.18.8 or 8.19.5 or 9.0.8 or 9.1.5.

For Users that Cannot Upgrade:
There are no workarounds

Severity: CVSSv3.1: Medium (5.4) CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVE ID: CVE-2025-37728