Skip to main content


Splunk Enterprise 6.1.8, 6.0.9, and 5.0.13 address multiple vulnerabilities


Splunk Enterprise 6.1.8, 6.0.9, and 5.0.13 address multiple vulnerabilities

At the time of this announcement, Splunk is not aware of any cases where these vulnerabilities have been actively exploited. Previous Product Security Announcements can be found on our Splunk Product Security Portal. Use SPL numbers when referencing issues in communication with Splunk. If there is no CVE Identifier listed with a vulnerability, it will be added once it is assigned by a CVE Numbering Authority. To standardize the calculation of severity scores for each vulnerability, when appropriate, Splunk uses Common Vulnerability Scoring System version 2.

Affected Products and Components

Mitigation and Upgrades

To mitigate these issues, Splunk recommends upgrading to the latest release and applying as many of the Hardening Standards from the Securing Splunk documentation as are relevant to your environment. Splunk Enterprise releases are cumulative, meaning that future releases will contain fixes to these vulnerabilities, new features and other bug fixes.

Vulnerability Descriptions and Ratings

Multiple vulnerabilities in OpenSSL versions before 1.0.1m and 0.9.8zf (SPL-98351)

Description: Splunk Enterprise versions 6.1.x before 6.1.8, 6.0.x before 6.0.9, and 5.0.x before 5.0.13 are affected by multiple OpenSSL vulnerabilities resolved by OpenSSL versions 1.0.1m and 0.9.9zf. The most severe of these issues could result in a crash during TLS connections.

CVSS Severity (version 2.0):

CVSS Base Score2.6
CVSS Impact Subscore2.9
CVSS Exploitability Subscore4.9
Overall CVSS Score2.6

Document History

  • 2015-May-27: Rev 1. Initial Release

Questions? Submit your question to Splunk Support.