First published: Wed Aug 30 2023(Updated: )
In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.2.0<8.2.12 | |
Splunk Splunk | >=9.0.0<9.0.6 | |
Splunk Splunk Cloud Platform | <=9.0.2305.100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40593 is a vulnerability in Splunk Enterprise versions lower than 9.0.6 and 8.2.12 that allows a malicious actor to send a malformed SAML request, causing a denial of service.
CVE-2023-40593 affects Splunk Enterprise versions lower than 9.0.6 and 8.2.12.
CVE-2023-40593 has a severity level of high.
CVE-2023-40593 can be exploited by sending a malformed SAML request to the `/saml/acs` REST endpoint in Splunk Enterprise.
Yes, there is a fix available for CVE-2023-40593. Upgrade to Splunk Enterprise version 9.0.6 or 8.2.12.