First published: Thu Jun 01 2023(Updated: )
In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ‘conf-user-seed’ REST endpoint.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.1.0<8.1.14 | |
Splunk Splunk | >=8.2.0<8.2.11 | |
Splunk Splunk | >=9.0.0<9.0.5 | |
Splunk Splunk Cloud Platform | <9.0.2303.100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32709 is a vulnerability in Splunk Enterprise and Splunk Cloud Platform versions below 9.0.5, 8.2.11, and 8.1.14 that allows low-privileged users to see the hashed version of the initial username and password for the Splunk instance.
The severity of CVE-2023-32709 is medium with a CVSS score of 4.3.
A low-privileged user can exploit CVE-2023-32709 by using the 'rest' SPL command against the Splunk instance to see the hashed version of the initial username and password.
Yes, upgrading Splunk Enterprise to version 9.0.5, 8.2.11, or 8.1.14, and upgrading Splunk Cloud Platform to version 9.0.2303.100 will fix CVE-2023-32709.
You can find more information about CVE-2023-32709 at the following links: [Splunk Research](https://research.splunk.com/application/a1be424d-e59c-4583-b6f9-2dcc23be4875/) and [Splunk Advisory](https://advisory.splunk.com/advisories/SVD-2023-0604).