When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Destination through Splunk Web and only applies to environments that have configured TLS certificate validation. It does not apply to Destinations configured directly in the outputs.conf configuration file. The vulnerability affects Splunk Enterprise version 9.0.0 and does not affect versions below 9.0.0, including the 8.1.x and 8.2.x versions.
References
Link | Resource |
---|---|
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html | Mitigation Vendor Advisory |
https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html | Mitigation Vendor Advisory |
Configurations
History
21 Nov 2024, 07:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html - Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
Information
Published : 2022-08-16 21:15
Updated : 2024-11-21 07:14
NVD link : CVE-2022-37437
Mitre link : CVE-2022-37437
CVE.ORG link : CVE-2022-37437
JSON object : View
Products Affected
splunk
- splunk
CWE
CWE-295
Improper Certificate Validation