Elasticsearch Users Beware of Malicious HTTP Requests Causing OutOfMemory Errors

CVSScvssV3_1: 7.5

Elasticsearch is a popular open source search and analytics engine. A vulnerability has been discovered that could allow attackers to crash Elasticsearch nodes by sending specially crafted HTTP requests.

The issue lies in how Elasticsearch handles incoming HTTP requests. By sending a moderate number of malformed requests, an unauthenticated attacker could force the targeted Elasticsearch node to run out of memory. This would cause the node to crash with an OutOfMemory error.

While there is no evidence yet that this vulnerability is actively being exploited, it poses a serious risk to Elasticsearch deployments. An attacker could potentially take nodes offline by overloading them with bad requests. This could impact the availability of search and analytics services.

If you have Elasticsearch running, you should apply the latest security updates released by Elastic as soon as possible. These patches will fix the underlying memory handling issues. It’s also recommended that you limit direct access to Elasticsearch nodes from untrusted networks wherever possible. Use a reverse proxy or firewall to control access.

Staying up-to-date with the latest software and security patches is the best way to protect yourself from newly discovered vulnerabilities like this one affecting Elasticsearch. Take care to promptly apply any updates from Elastic to close potential holes in your setup.