Elasticsearch: The Open Cluster Epidemic
Elasticsearch ships with no authentication by default. The _search endpoint returns every indexed document, _cat/indices lists every index, and _cluster/settings exposes internal configuration. Thousands of clusters are publicly exposed with customer PII, logs, and credentials — a recurring pattern in data breach forensics and vulnerability assessments.
No authentication by default
Elasticsearch ships with security features disabled. Out of the box, anyone who can reach port 9200 has full access to every index, every document, and every cluster setting. There is no login prompt, no API key, no authentication of any kind.
The enumeration chain
GET /. confirms Elasticsearch, returns version and cluster nameGET /_cat/indices?v. lists every index with document count and sizeGET /{index}/_search?size=1000. dumps up to 1000 documents from any indexGET /_cluster/settings?include_defaults=true. full cluster configuration
What we find in exposed clusters
Elasticsearch is used for logging, search, and analytics. Exposed clusters typically contain:
- Application logs with full request/response bodies (including auth tokens and passwords)
- User search history and behavioral analytics
- Customer PII indexed for search functionality
- Infrastructure metrics revealing internal architecture
Kibana compounds the problem
Kibana (the Elasticsearch UI) also ships with no authentication. If Kibana is exposed, it provides a visual interface to browse every index, run arbitrary queries, and modify cluster settings.
How we detect this
Our scanner:
- Probes port 9200 for the Elasticsearch banner
- Requests
/_cat/indicesto enumerate all indices - Samples documents from the first few indices to assess data sensitivity
- Checks for Kibana on port 5601
Defense
- Enable Elasticsearch Security (X-Pack). it's been free since version 6.8
- Set
xpack.security.enabled: truein elasticsearch.yml - Configure TLS for inter-node and client communication
- Never expose port 9200 or 5601 to the internet
- Use a reverse proxy with authentication if external access is needed
Want us to check your Elasticsearch setup?
Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.
