Lucene search

K
cve[email protected]CVE-2022-32153
HistoryJun 15, 2022 - 5:15 p.m.

CVE-2022-32153

2022-06-1517:15:08
CWE-295
CWE-297
web.nvd.nist.gov
35
4
splunk
enterprise
cloud
security
cve-2022-32153
tls
certificate-validation
update
hostname-validation

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

79.7%

Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation.

Affected configurations

NVD
Node
splunksplunkRange<9.0enterprise
OR
splunksplunk_cloud_platformRange<8.2.2203

CNA Affected

[
  {
    "product": "Splunk Enterprise",
    "vendor": "Splunk, Inc",
    "versions": [
      {
        "lessThan": "9.0",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Splunk Cloud Platform",
    "vendor": "Splunk, Inc",
    "versions": [
      {
        "lessThan": "8.2.2203",
        "status": "affected",
        "version": "8.2",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

79.7%

Related for CVE-2022-32153