{"api_version":"1","generated_at":"2026-04-23T05:57:02+00:00","cve":"CVE-2020-7010","urls":{"html":"https://cve.report/CVE-2020-7010","api":"https://cve.report/api/cve/CVE-2020-7010.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-7010","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-7010"},"summary":{"title":"CVE-2020-7010","description":"Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.","state":"PUBLIC","assigner":"security@elastic.co","published_at":"2020-06-03 18:15:00","updated_at":"2020-06-05 18:37:00"},"problem_types":["CWE-335"],"metrics":[],"references":[{"url":"https://www.elastic.co/community/security/","name":"N/A","refsource":"N/A","tags":["Vendor Advisory"],"title":"Security issues | Elastic","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-7010","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7010","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"7010","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"elastic","cpe5":"elastic_cloud_on_kubernetes","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"7010","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"elastic","cpe5":"elastic_cloud_on_kubernetes","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"security@elastic.co","ID":"CVE-2020-7010","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Elastic","product":{"product_data":[{"product_name":"Elastic Cloud on Kubernetes","version":{"version_data":[{"version_value":"before 1.1.0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-335: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)"}]}]},"references":{"reference_data":[{"url":"https://www.elastic.co/community/security/","refsource":"MISC","name":"https://www.elastic.co/community/security/"}]},"description":{"description_data":[{"lang":"eng","value":"Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK."}]}},"nvd":{"publishedDate":"2020-06-03 18:15:00","lastModifiedDate":"2020-06-05 18:37:00","problem_types":["CWE-335"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:elastic:elastic_cloud_on_kubernetes:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"7010","Ordinal":"167281","Title":"CVE-2020-7010","CVE":"CVE-2020-7010","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"7010","Ordinal":"1","NoteData":"Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"7010","Ordinal":"2","NoteData":"2020-06-03","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"7010","Ordinal":"3","NoteData":"2020-06-03","Type":"Other","Title":"Modified"}]}}}