It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.
{
"nvd_published_at": "2024-07-31T18:15:11Z",
"severity": "MODERATE",
"github_reviewed_at": "2024-07-31T20:53:02Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-311"
]
}