In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
References
Link | Resource |
---|---|
https://advisory.splunk.com/advisories/SVD-2024-1009 | Vendor Advisory |
https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Oct 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:* |
|
CWE | CWE-532 | |
References | () https://advisory.splunk.com/advisories/SVD-2024-1009 - Vendor Advisory | |
References | () https://research.splunk.com/application/93dc7182-c5da-4085-82ec-401abf33d623/ - Vendor Advisory | |
First Time |
Splunk splunk
Splunk |
15 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-14 17:15
Updated : 2024-10-17 13:16
NVD link : CVE-2024-45739
Mitre link : CVE-2024-45739
CVE.ORG link : CVE-2024-45739
JSON object : View
Products Affected
splunk
- splunk