Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the sslverificationmode => full was set.
{
"cpes": [
"cpe:2.3:a:elastic:logstash:*:*:*:*:*:ruby:*:*"
],
"severity": "Medium"
}