First published: Fri May 06 2022(Updated: )
A potential vulnerability in Splunk Enterprise's implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO MFA and does not impact or affect a DUO product or service.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | >=8.1.0<8.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-26253 is considered high due to its potential to bypass multi-factor authentication in Splunk Enterprise versions before 8.1.6.
To fix CVE-2021-26253, upgrade your Splunk Enterprise to version 8.1.6 or later.
CVE-2021-26253 affects Splunk Enterprise instances that are configured to use DUO MFA and are running versions prior to 8.1.6.
CVE-2021-26253 impacts the multi-factor authentication mechanism within Splunk Enterprise when using DUO MFA.
Currently, there is no documented workaround for CVE-2021-26253, so upgrading to the fixed version is recommended.