First published: Fri May 06 2022(Updated: )
A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | >=8.1.0<8.1.5 | |
Splunk | =8.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31559 has been classified as a high severity vulnerability.
To fix CVE-2021-31559, upgrade Splunk Enterprise to version 8.1.5 or 8.2.1 or later.
CVE-2021-31559 affects Splunk Enterprise versions before 8.1.5 and 8.2 before 8.2.1.
CVE-2021-31559 allows arbitrary events to be written to an index when S2S TCP Token authentication is bypassed.
No, Universal Forwarders are not impacted by CVE-2021-31559.