First published: Fri May 06 2022(Updated: )
The Splunk Enterprise REST API allows enumeration of usernames via the lockout error message. The potential vulnerability impacts Splunk Enterprise instances before 8.1.7 when configured to repress verbose login errors.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | >=8.1.0<8.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33845 is considered a medium severity vulnerability due to its potential to allow username enumeration.
To mitigate CVE-2021-33845, update your Splunk Enterprise instance to version 8.1.7 or later.
CVE-2021-33845 affects Splunk Enterprise versions prior to 8.1.7.
CVE-2021-33845 allows attackers to enumerate valid usernames via error messages from the REST API.
Yes, CVE-2021-33845 is related to authentication as it concerns the exposure of usernames during failed login attempts.