Splunk Enterprise deployment servers allow unauthenticated forwarder bundle downloads
Advisory ID: SVD-2022-0607
CVSSv3.1 Score: 7.5, High
CVE ID: CVE-2022-32157
Last Update: 2022-06-14
CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Bug ID: SPL-176828
Security Content: Splunk Process Injection Forwarder Bundle Downloads
Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients. Once enabled, deployment servers can manage only universal forwarder versions 9.0 and later. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation.
The Splunk Cloud Platform (SCP) does not offer or use deployment servers and is not affected by the vulnerability. For SCP customers that run deployment servers, upgrade to version 9.0 or higher. At the time of publishing, we have no evidence of exploitation of this vulnerability by external parties.
Upgrade Splunk Enterprise deployment servers to version 9.0 or higher, upgrade Universal Forwarders to version 9.0 or higher, and Configure authentication for deployment servers and clients.
|Splunk Enterprise||Versions before 9.0|
Nadim Taha at Splunk