Security Advisories for Splunk 9.0

Splunk is committed to using inclusive and unbiased language. This blog post might contain terminology that we no longer use. For more information on our updated terminology and our stance on biased language, please visit our blog post. We appreciate your understanding as we work towards making our community more inclusive for everyone.

Customer security and trust are our top priorities. On June 14, 2022 Splunk published eight Security Advisories regarding vulnerabilities related to Splunk Enterprise and Splunk Cloud Platform. We’ve received customer feedback about the vulnerabilities and our process, following the release of the advisories, which we appreciate and are addressing as part of our commitment to continuously improving Splunk's security posture.

We’re committed to reporting new vulnerabilities consistent with our Security Advisory Policy and expediting maintenance releases for supported versions to address critical-risk, high-impact vulnerabilities outlined in our security program here.

Different advisories may be applicable to your Splunk environment depending on the Splunk deployment type you are using, such as Splunk Cloud Platform (across regions, cloud providers, and compliance environments) and Customer Managed Platform (CMP).

The advisories and their links are listed below:

To remediate all the vulnerabilities listed in the advisories, we recommend customers upgrade to 9.0. We understand that not all of our customers will be able to upgrade to the latest release immediately. To reduce the severity of these vulnerabilities during the process of upgrade, we have published partial mitigations as additional security controls to help limit security exposure. We will continue to update our guidance on our Splunk advisories page as applicable.

Our Rationale and Process

We issued a major release instead of backporting all the security vulnerabilities to alert customers to material changes to product behavior and avert potential issues with customer production deployments. The intent was to be consistent with our major/minor patch release policy. Below are some of the specific reasons why we didn’t backport initially by vulnerability, and why we feel it’s not practical to backport other Splunk 9.0 security fixes.

We recommend opening Support cases for environment-specific assistance and issue tracking and we will update ideas.splunk.com as we make progress on a backport for SVD-2022-0608.

Risk Mitigation Resources

To stay up-to-date on any actions required (e.g.patching) and to mitigate risks, please leverage the resources below:

Next steps

We remain committed to helping customers identify and remediate security issues quickly.

For “Critical” or “High” vulnerabilities we plan to provide advisories and any available patches as close to real-time as possible. For vulnerabilities considered “Moderate” or “Low Risk”, we’re planning quarterly releases of any available patches so that Splunk administrators can plan for patches and upgrades on a predictable schedule. Please continue to watch the Splunk advisories page for the latest advisories or use the RSS feed with your favorite aggregator.

Thank you to our community for your feedback. We will be more responsive and will communicate as clearly as possible going forward.

----------------------------------------------------
Thanks!
Garth Fort

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.