EIQ-2026-0001#
ID |
EIQ-2026-0001 |
|---|---|
CVE |
CVE-2026-33466 |
Description |
Improper Limitation of a Pathname to a Restricted Directory in Logstash Leading to Arbitrary File Write |
Date |
21 Apr 2026 |
Severity |
3 - HIGH |
CVSSv3 score |
8.1 |
Status |
⏲ |
Assessment |
Elastic issued a high severity security advisory ESA-2026-29. Our assessment is that Intelligence Center customers who have not modified the default values of the Logstash (if deployed) as configured by the IC installation playbooks uses the default value for However, out of an abundance of caution, this advisory reflects the “high” severity set in ESA-2026-29. The Intelligence Center itself does not use or depend on Logstash’s Geo-IP database features. Some Intelligence Center deployments do not deploy Logstash. Check your application node to see Logstash is running by running as root By default, the IC installation playbooks apply Logstash configurations that leave However, customers may have chosen to modify this default configuration. A customer who sets We recommend that customers apply the mitigations described in ESA-2026-29. |
Mitigation |
Based on ESA-2026-29, Logstash configurations that fulfill these 2 conditions are affected:
To mitigate, first check if Logstash is running on your Intelligence Center deployment. On your applicatio node, run as root: If it is running, mitigate per Elastic’s advice. Where Logstash is running, edit the
Then, restart Logstash with |
Affected versions |
All IC deployments that have enabled and deployed Logstash versions 8.19.13 and older, and have explicitly set IC instances deployed with the default Logstash configuration, i.e. does not set the value of EclecticIQ hosted customers are not affected. Customer clusters do not have Logstash deployed. If you do not deploy Logstash for your Intelligence Center instance, your instance is not affected. |
Notes |
N/A |