Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the sslverificationmode => full was set.
{ "cpes": [ "cpe:2.3:a:elastic:logstash:*:*:*:*:*:ruby:*:*" ], "severity": "Medium" }