Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
CVE ID: CVE-2025-37730
CVSS Base Severity: MEDIUM
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Vendor: Elastic
Product: Logstash
EPSS Score: 0.02% (probability of being exploited)
EPSS Percentile: 3.36% (scored less or equal to compared to others)
EPSS Date: 2025-06-04 (when was this score calculated)
SSVC Exploitation: none
SSVC Technical Impact: partial
SSVC Automatable: false