In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, connections from misconfigured nodes without valid certificates did not fail by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI) to enable the remediation.
References
| Link | Resource |
|---|---|
| https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html | Vendor Advisory |
| https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates | Release Notes Vendor Advisory |
| https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-15 17:15
Updated : 2022-06-24 01:21
NVD link : CVE-2022-32156
Mitre link : CVE-2022-32156
JSON object : View
Products Affected
splunk
- universal_forwarder
- splunk
CWE
CWE-295
Improper Certificate Validation
