Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-31559: SVD-2022-0503

A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders.

CVE
#vulnerability#auth#ssl

S2S TcpToken authentication bypass****Description

A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders.

See Enable a receiver for more information on configuring an indexer to listen for UF traffic. See Control forwarder access for more information on securing UF to Indexer traffic with TcpTokens.

When Splunk forwarding is secured using TLS, the attack requires compromising the certificate. As a partial mitigation and a security best practice, see Configure Splunk forwarding to use your own SSL certificates. Implementation reduces the severity to Medium.

Solution

Upgrade Splunk Enterprise Indexer 8.1 versions to 8.1.5 or later and 8.2.0 versions to 8.2.1 or later.

Product Status

Product

Version

Affected Versions

Fix Version

Splunk Enterprise

8.2

8.2.0

8.2.1

Splunk Enterprise

8.1

8.1.4 and earlier

8.1.5

The vulnerability does not impact Splunk Cloud Platform instances.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907