First published: Wed Aug 30 2023(Updated: )
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.
Credit: prodsec@splunk.com prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=8.2.0<8.2.12 | |
Splunk Splunk | >=9.0.0<9.0.6 | |
Splunk Splunk | =9.1.0 | |
Splunk Splunk Cloud Platform | <=9.0.2305.100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40594 is a vulnerability in Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1 that allows an attacker to perform a denial of service (DoS) using the `printf` SPL function.
CVE-2023-40594 affects Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1.
The severity of CVE-2023-40594 is high, with a severity value of 7.5.
An attacker can exploit CVE-2023-40594 by using the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.
To protect your Splunk Enterprise instance from CVE-2023-40594, update to versions 8.2.12, 9.0.6, or 9.1.1 of Splunk Enterprise.