Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Once enabled, deployment servers can manage only Universal Forwarder versions 9.0 and higher. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation.
References
Link | Resource |
---|---|
https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates | Release Notes Vendor Advisory |
https://research.splunk.com/application/splunk_process_injection_forwarder_bundle_downloads/ | Mitigation Vendor Advisory |
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html | Vendor Advisory |
https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients | Mitigation Vendor Advisory |
Configurations
Information
Published : 2022-06-15 10:15
Updated : 2022-06-23 17:51
NVD link : CVE-2022-32157
Mitre link : CVE-2022-32157
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
splunk
- splunk