First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk | >=9.0.0<9.0.2 | |
Splunk Splunk Cloud Platform | <9.0.2205 | |
>=8.1.0<8.1.12 | ||
>=8.2.0<8.2.9 | ||
>=9.0.0<9.0.2 | ||
<9.0.2205 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43567.
The severity level of CVE-2022-43567 is high.
An authenticated user can exploit CVE-2022-43567 by running arbitrary operating system commands remotely through specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.
Versions below 8.2.9, 8.1.12, and 9.0.2 of Splunk Enterprise are affected by CVE-2022-43567.
To fix CVE-2022-43567 in Splunk Enterprise, you should update to version 8.2.9, 8.1.12, or 9.0.2 of Splunk Enterprise.