Lucene search

K
cve[email protected]CVE-2023-32713
HistoryJun 01, 2023 - 5:15 p.m.

CVE-2023-32713

2023-06-0117:15:10
CWE-269
web.nvd.nist.gov
102
splunk
app
stream
privilege escalation
vulnerability
cve-2023-32713

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.6%

In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user.

Affected configurations

NVD
Node
splunksplunk_app_for_streamRange<8.1.1

CNA Affected

[
  {
    "product": "Splunk App for Stream",
    "vendor": "Splunk",
    "versions": [
      {
        "version": "8.1",
        "status": "affected",
        "versionType": "custom",
        "lessThan": "8.1.1"
      }
    ]
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.6%

Related for CVE-2023-32713