It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.
{ "cpes": [ "cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:maven:*:*" ], "severity": "Medium" }