It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass
parameter is passed in the command invocation.
{ "nvd_published_at": "2024-07-31T18:15:11Z", "cwe_ids": [ "CWE-311" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-07-31T20:53:02Z" }