First published: Tue Aug 16 2022(Updated: )
When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Destination through Splunk Web and only applies to environments that have configured TLS certificate validation. It does not apply to Destinations configured directly in the outputs.conf configuration file. The vulnerability affects Splunk Enterprise version 9.0.0 and does not affect versions below 9.0.0, including the 8.1.x and 8.2.x versions.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | =9.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37437 is a vulnerability that affects Splunk Enterprise 9.0.0. When using Ingest Actions to configure a destination on Amazon S3 in Splunk Web, TLS certificate validation is not performed correctly, leading to potential security risks.
CVE-2022-37437 affects the security of connections between Splunk Enterprise and an Ingest Actions Destination on Amazon S3. TLS certificate validation is not correctly performed, allowing for potential security vulnerabilities.
CVE-2022-37437 has a severity rating of critical with a CVSS score of 9.8, indicating a high risk of exploitation and potential impact on system confidentiality, integrity, and availability.
To fix CVE-2022-37437, Splunk users should upgrade their Splunk Enterprise to a fixed version as recommended by Splunk. See the reference link for more details.
You can find more information about CVE-2022-37437, including details of the vulnerability and recommended actions, in the reference link provided.