Learn about how Splunk keeps your data secure and private in its offerings and how it deploys Security by Design particularly in hosted services.
If you're a professional security researcher that discovered a vulnerability in a Splunk Product or Service, submit your findings to us
This page lists announcements of security fixes made in Critical Security Alerts, Quarterly Security Patch Updates, and Third Party Bulletins.
Splunk will publish out-of-band advisories for vulnerabilities that are time-sensitive as soon as possible.
SVD | Date | Title | Severity | CVE |
---|---|---|---|---|
SVD-2022-0608 | June 14, 2022 | Deployment servers allow client publishing of bundles | Critical | CVE-2022-32158 |
SVD-2022-0607 | June 14, 2022 | Deployment servers allow unauthenticated bundle access | High | CVE-2022-32157 |
SVD-2022-0606 | June 14, 2022 | Splunk Enterprise and UF CLI connections lacked TLS cert... | High | CVE-2022-32156 |
SVD-2022-0605 | June 14, 2022 | UF management services allows remote login by default | NA | CVE-2022-32155 |
SVD-2022-0604 | June 14, 2022 | Risky commands warnings in dashboards | Medium | CVE-2022-32154 |
SVD-2022-0603 | June 14, 2022 | Splunk Enterprise lacked TLS host name certificate validat... | High | CVE-2022-32153 |
SVD-2022-0602 | June 14, 2022 | Splunk Enterprise lacked TLS certificate validation for S2S... | High | CVE-2022-32152 |
SVD-2022-0601 | June 14, 2022 | Splunk Enterprise disabled TLS validation using the CA cer... | High | CVE-2022-32151 |
SVD-2022-0301 | March 24, 2022 | Indexer denial-of-service via malformed S2S request | High | CVE-2021-3422 |
The vulnerability does not impact Splunk Cloud Platform instances.
Security Updates are collections of security fixes for supported versions of Splunk products. We plan to create Security Patch Updates and make them available through scheduled cloud releases or on-premises maintenance releases for supported versions of Splunk products at the time of the quarterly advisory disclosure. When patches can not be backported due to technical feasibility or otherwise, we will publish mitigation and additional compensating control guidance.
Security Patch Updates are typically published on the first Tuesday of Splunk’s fiscal quarter. The next three planned dates are:
For archived security announcements, go to the Security Announcements Archive.
Third-Party Bulletins announce security patches for third-party software. Splunk publishes Third Party Bulletins on the same day as Critical Security Alerts or Quarterly Security Patch Updates.
SVD | Date | Title | Severity |
---|---|---|---|
SVD-2022-1113 | November 2, 2022 | November Third Party Package updates in Splunk Enterprise | High |
SVD-2022-1114 | November 1, 2022 | Splunk’s response to OpenSSL’s CVE-2022-3602 and CVE-2022-3786 | High |
SVD-2022-0804 | August 16, 2022 | August Third Party Package updates in Splunk Enterprise and UFs | Medium |
NA | January 7, 2022 | Apache Log4j CVE-2021-44228, and CVE-2021-45046 | Critical |
Splunk continuously monitors for vulnerabilities discovered through scans, offensive exercises, employees or externally reported by vendors or researchers. Splunk follows industry best practices to discover and remediate vulnerabilities. To report a security vulnerability, please submit to the Security Vulnerability Submission Portal.
Splunk will not provide additional information about the specifics of vulnerabilities beyond what is provided in the Critical Security Alert or the Security Patch Update. Splunk does not distribute active exploit code (i.e. proof of concept code) for vulnerabilities in our products.
The Splunk teams regularly evaluate Critical Security Alerts, Quarterly Security Patch Updates and Third Party bulletins as they become available and apply the relevant patches in accordance with applicable change management processes.
Customers requiring additional information that is not addressed in the Critical Patch Update Advisory may obtain information by going to the Support Portal and submitting a New Case.