-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.2962
         Splunk Enterprise and Universal Forwarder security update
                               16 June 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Splunk Enterprise
                   Universal Forwarder
Publisher:         Splunk
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-32156  

Original Bulletin: 
   https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html

Comment: CVSS (Max):  7.4 CVE-2022-32156 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
         CVSS Source: Splunk
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

- --------------------------BEGIN INCLUDED TEXT--------------------

Splunk Enterprise and Universal Forwarder CLI connections lacked TLS
certificate validation

Advisory ID: SVD-2022-0606     CVE ID: CVE-2022-32156

Published: 2022-06-14          Last Update: 2022-06-14

CVSSv3.1 Score: 7.4, High      CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/
                               S:U/C:H/I:H/A:N
CWE: CWE-295
                               Bug ID: SPL-49451
CSAF: 2022-06-14-svd-2022-0606

Description

In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk
command-line interface (CLI) did not validate TLS certificates while connecting
to a remote Splunk platform instance by default. Splunk peer communications
configured properly with valid certificates were not vulnerable. However,
connections from misconfigured nodes without valid certificates did not fail by
default. After updating to version 9.0, see Configure TLS host name validation
for the Splunk CLI to enable the remediation. 

The vulnerability does not affect the Splunk Cloud Platform. At the time of
publishing, we have no evidence of exploitation of this vulnerability by
external parties.

 

Solution

Upgrade Splunk Enterprise and Universal Forwarder versions to 9.0 or higher and
Configure TLS host name validation for the Splunk CLI.

 

Product Status

      Product        Affected Versions
Splunk Enterprise   Versions before 9.0
Universal Forwarder Versions before 9.0

 

Acknowledgments

Chris Green at Splunk

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=v/mS
-----END PGP SIGNATURE-----