It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.
{
"cpes": [
"cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:maven:*:*"
],
"severity": "High"
}