Page 12 of 106 results (0.012 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders. Una petición diseñada omite la autenticación S2S TCP Token escribiendo eventos arbitrarios en un índice en Splunk Enterprise Indexer versiones 8.1 anteriores a 8.1.5 y versiones 8.2 anteriores a 8.2.1. La vulnerabilidad afecta a los Indexadores configurados para usar TCPTokens. • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html • CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

A potential vulnerability in Splunk Enterprise's implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or service. Una posible vulnerabilidad en la implementación de DUO MFA de Splunk Enterprise permite omitir la verificación MFA en las versiones de Splunk Enterprise anteriores a 8.1.6. La vulnerabilidad potencial afecta a las instancias de Splunk Enterprise configuradas para usar DUO MFA y no impacta ni afecta a un producto o servicio de DUO • https://www.splunk.com/en_us/product-security/announcements/svd-2022-0504.html • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic. The vulnerability impacts Splunk Enterprise versions before 7.3.9, 8.0 versions before 8.0.9, and 8.1 versions before 8.1.3. It does not impact Universal Forwarders. When Splunk forwarding is secured using TLS or a Token, the attack requires compromising the certificate or token, or both. Implementation of either or both reduces the severity to Medium. • https://claroty.com/2022/03/24/blog-research-locking-down-splunk-enterprise-indexers-and-forwarders https://www.splunk.com/en_us/product-security/announcements/svd-2022-0301.html • CWE-20: Improper Input Validation CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Splunk 5.0.3 has an Unquoted Service Path in Windows for Universal Forwarder which can allow an attacker to escalate privileges Splunk versión 5.0.3, presenta una Ruta de Servicio Sin Comillas en Windows para Universal Forwarder que puede permitir a un atacante escalar privilegios. • http://www.splunk.com/view/SP-CAAAHXG • CWE-269: Improper Privilege Management •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Splunk before 5.0.4 lacks X-Frame-Options which can allow Clickjacking Splunk versiones anteriores a 5.0.4, carece de X-Frame-Options que puede permitir un Secuestro del Cliqueo. • http://www.splunk.com/view/SP-CAAAH32 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •