{"api_version":"1","generated_at":"2026-04-23T05:57:55+00:00","cve":"CVE-2018-3825","urls":{"html":"https://cve.report/CVE-2018-3825","api":"https://cve.report/api/cve/CVE-2018-3825.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-3825","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-3825"},"summary":{"title":"CVE-2018-3825","description":"In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 a default master encryption key is used in the process of granting ZooKeeper access to Elasticsearch clusters. Unless explicitly overwritten, this master key is predictable across all ECE deployments. If an attacker can connect to ZooKeeper directly they would be able to access configuration information of other tenants if their cluster ID is known.","state":"PUBLIC","assigner":"security@elastic.co","published_at":"2018-09-19 19:29:00","updated_at":"2019-10-09 23:40:00"},"problem_types":["CWE-1188"],"metrics":[],"references":[{"url":"https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778","name":"https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Elastic Cloud Enterprise 1.1.4 security update - Security Announcements - Discuss the Elastic Stack","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.elastic.co/community/security","name":"https://www.elastic.co/community/security","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-3825","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3825","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"3825","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"elastic","cpe5":"elastic_cloud_enterprise","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"3825","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"elastic","cpe5":"elastic_cloud_enterprise","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@elastic.co","ID":"CVE-2018-3825","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Elastic Cloud Enterprise (ECE)","version":{"version_data":[{"version_value":"before 1.1.4"}]}}]},"vendor_name":"Elastic"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 a default master encryption key is used in the process of granting ZooKeeper access to Elasticsearch clusters. Unless explicitly overwritten, this master key is predictable across all ECE deployments. If an attacker can connect to ZooKeeper directly they would be able to access configuration information of other tenants if their cluster ID is known."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-321: Use of Hard-coded Cryptographic Key"}]}]},"references":{"reference_data":[{"name":"https://www.elastic.co/community/security","refsource":"CONFIRM","url":"https://www.elastic.co/community/security"},{"name":"https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778","refsource":"CONFIRM","url":"https://discuss.elastic.co/t/elastic-cloud-enterprise-1-1-4-security-update/135778"}]}},"nvd":{"publishedDate":"2018-09-19 19:29:00","lastModifiedDate":"2019-10-09 23:40:00","problem_types":["CWE-1188"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:elastic:elastic_cloud_enterprise:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"3825","Ordinal":"119732","Title":"CVE-2018-3825","CVE":"CVE-2018-3825","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"3825","Ordinal":"1","NoteData":"In Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 a default master encryption key is used in the process of granting ZooKeeper access to Elasticsearch clusters. Unless explicitly overwritten, this master key is predictable across all ECE deployments. If an attacker can connect to ZooKeeper directly they would be able to access configuration information of other tenants if their cluster ID is known.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"3825","Ordinal":"2","NoteData":"2018-09-19","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"3825","Ordinal":"3","NoteData":"2018-09-19","Type":"Other","Title":"Modified"}]}}}