{"api_version":"1","generated_at":"2026-04-08T22:41:58+00:00","cve":"CVE-2023-46667","urls":{"html":"https://cve.report/CVE-2023-46667","api":"https://cve.report/api/cve/CVE-2023-46667.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-46667","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-46667"},"summary":{"title":"CVE-2023-46667","description":"An issue was discovered in Fleet Server >= v8.10.0 and < v8.10.3 where Agent enrolment tokens are being inserted into the Fleet Server’s log file in plain text. These enrolment tokens could allow someone to enrol an agent into an agent policy, and potentially use that to retrieve other secrets in the policy including for Elasticsearch and third-party services. Alternatively a threat actor could potentially enrol agents to the clusters and send arbitrary events to Elasticsearch.","state":"PUBLIC","assigner":"security@elastic.co","published_at":"2023-10-26 01:15:00","updated_at":"2023-11-03 15:38:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://discuss.elastic.co/t/fleet-server-v8-10-3-security-update/344737","name":"https://discuss.elastic.co/t/fleet-server-v8-10-3-security-update/344737","refsource":"MISC","tags":[],"title":"Fleet Server v8.10.3 Security Update - Security Announcements - Discuss the Elastic Stack","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.elastic.co/community/security","name":"https://www.elastic.co/community/security","refsource":"MISC","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-46667","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46667","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"46667","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"elastic","cpe5":"fleet_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-46667","ASSIGNER":"security@elastic.co","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Fleet Server >= v8.10.0 and < v8.10.3 where Agent enrolment tokens are being inserted into the Fleet Server’s log file in plain text. These enrolment tokens could allow someone to enrol an agent into an agent policy, and potentially use that to retrieve other secrets in the policy including for Elasticsearch and third-party services. Alternatively a threat actor could potentially enrol agents to the clusters and send arbitrary events to Elasticsearch."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-532: Insertion of Sensitive Information into Log File","cweId":"CWE-532"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Elastic","product":{"product_data":[{"product_name":"Fleet Server","version":{"version_data":[{"version_affected":"<","version_name":"8.10.0","version_value":"8.10.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://discuss.elastic.co/t/fleet-server-v8-10-3-security-update/344737","refsource":"MISC","name":"https://discuss.elastic.co/t/fleet-server-v8-10-3-security-update/344737"},{"url":"https://www.elastic.co/community/security","refsource":"MISC","name":"https://www.elastic.co/community/security"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-26 01:15:00","lastModifiedDate":"2023-11-03 15:38:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:elastic:fleet_server:*:*:*:*:*:*:*:*","versionStartIncluding":"8.10.0","versionEndExcluding":"8.10.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}