It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.
{ "severity": "High", "cpes": [ "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:maven:*:*" ] }