Changeflow GovPing Data Privacy & Cybersecurity Multiple vulnerabilities in Elastic products
Priority review Notice Added Final

Multiple vulnerabilities in Elastic products

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published March 20th, 2026
Detected March 20th, 2026
Email

Summary

CERT-FR has issued an advisory regarding multiple vulnerabilities discovered in various Elastic products, including Elasticsearch, Kibana, Logstash, Metricbeat, and Packetbeat. These vulnerabilities could allow remote attackers to execute arbitrary code, compromise data confidentiality, and bypass security policies.

What changed

CERT-FR, the French national cybersecurity agency, has issued an advisory (CERTFR-2026-AVI-0325) detailing multiple critical vulnerabilities affecting several Elastic products. The affected versions include Elasticsearch (8.x prior to 8.19.8, 9.x prior to 9.1.8), Kibana (8.x prior to 8.19.13, 9.3.x prior to 9.3.2, 9.x prior to 9.2.7), Logstash (8.x prior to 8.19.10, 9.2.x prior to 9.2.4, 9.x prior to 9.1.10), Metricbeat (8.x prior to 8.19.13, 9.x prior to 9.2.5), and Packetbeat (8.x prior to 8.19.11, 9.x prior to 9.2.5). The vulnerabilities pose significant risks, including remote arbitrary code execution, data confidentiality breaches, and security policy bypass.

Organizations utilizing these Elastic products must immediately refer to the vendor's security bulletins for patch information. The advisory lists specific Elastic security update references and associated CVEs (e.g., CVE-2025-32434, CVE-2026-26931). Prompt application of vendor-provided patches is crucial to mitigate the risks of data compromise and unauthorized access. Failure to patch could lead to severe security incidents, including remote code execution and denial of service.

What to do next

  1. Review Elastic security bulletins for affected product versions
  2. Apply vendor-provided patches to mitigate identified vulnerabilities
  3. Assess potential impact of vulnerabilities on data confidentiality and security policies

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 20 mars 2026 N° CERTFR-2026-AVI-0325 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans les produits Elastic

Gestion du document

| Référence | CERTFR-2026-AVI-0325 |
| Titre | Multiples vulnérabilités dans les produits Elastic |
| Date de la première version | 20 mars 2026 |
| Date de la dernière version | 20 mars 2026 |
| Source(s) | Bulletin de sécurité Elastic 385530 du 19 mars 2026
Bulletin de sécurité Elastic 385531 du 19 mars 2026
Bulletin de sécurité Elastic 385532 du 19 mars 2026
Bulletin de sécurité Elastic 385533 du 19 mars 2026
Bulletin de sécurité Elastic 385534 du 19 mars 2026
Bulletin de sécurité Elastic 385535 du 19 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Atteinte à la confidentialité des données
  • Contournement de la politique de sécurité
  • Déni de service à distance
  • Exécution de code arbitraire à distance

Systèmes affectés

  • Elasticsearch versions 8.x antérieures à 8.19.8
  • Elasticsearch versions 9.x antérieures à 9.1.8
  • Kibana versions 8.x antérieures à 8.19.13
  • Kibana versions 9.3.x antérieures à 9.3.2
  • Kibana versions 9.x antérieures à 9.2.7
  • Logstash versions 8.x antérieures à 8.19.10
  • Logstash versions 9.2.x antérieures à 9.2.4
  • Logstash versions 9.x antérieures à 9.1.10
  • Metricbeat versions 8.x antérieures à 8.19.13
  • Metricbeat versions 9.x antérieures à 9.2.5
  • Packetbeat versions 8.x antérieures à 8.19.11
  • Packetbeat versions 9.x antérieures à 9.2.5

Résumé

De multiples vulnérabilités ont été découvertes dans les produits Elastic. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 20 mars 2026 Version initiale

Named provisions

Risks Affected Systems Summary Solutions Documentation

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
March 20th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0325

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability Management Data Security
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Security Vulnerability Management

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.