First published: Fri Nov 04 2022(Updated: )
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.12 | |
Splunk Splunk | >=8.2.0<8.2.9 | |
Splunk Splunk | >=9.0.0<9.0.2 | |
Splunk Splunk Cloud Platform | <9.0.2209 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43572 is a vulnerability in Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2 that allows a denial-of-service attack by sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols.
CVE-2022-43572 affects Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, causing a blockage or denial-of-service that prevents further indexing.
CVE-2022-43572 affects Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2.
CVE-2022-43572 has a severity level of 6.5 (high).
To fix CVE-2022-43572, upgrade Splunk Enterprise to version 8.2.9, 8.1.12, or 9.0.2.