First published: Thu Jan 23 2020(Updated: )
Splunk 5.0.3 has an Unquoted Service Path in Windows for Universal Forwarder which can allow an attacker to escalate privileges
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=5.0<5.0.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6773 is classified as a medium severity vulnerability due to its ability to allow privilege escalation.
To mitigate CVE-2013-6773, ensure that the Splunk Universal Forwarder service path is correctly quoted to avoid unquoted service path vulnerabilities.
CVE-2013-6773 affects Splunk versions from 5.0 to 5.0.3.
Yes, CVE-2013-6773 can affect Windows systems where Splunk 5.0.3 is installed and configured with an unquoted service path.
If you are using an affected version of Splunk, it is recommended to upgrade to a later version or apply necessary patches that address this vulnerability.