Refine your search

12 vulnerabilities found for Splunk Cloud Platform by Splunk

CERTFR-2025-AVI-0838
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.109
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2406 antérieures à 9.2.2406.123
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.119
Splunk Splunk Enterprise Splunk Enterprise versions 10.0.x antérieures à 10.0.1
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.2.2406 antérieures à 9.2.2406.123
Splunk Splunk Enterprise Splunk Enterprise versions 10.0.x antérieures à 10.0.0
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.8
Splunk Splunk Enterprise Splunk Enterprise versions 9.4.x antérieures à 9.4.4
Splunk Splunk Enterprise Splunk Enterprise versions 9.3.x antérieures à 9.3.6
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.3.2411 antérieures à 9.3.2411.108
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.3.2408 antérieures à 9.3.2408.118
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.111
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.109",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.119",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.0",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.8",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.6",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.108",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.118",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.111",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-44906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
    },
    {
      "name": "CVE-2022-46175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
    },
    {
      "name": "CVE-2015-5237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
    },
    {
      "name": "CVE-2025-20367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20367"
    },
    {
      "name": "CVE-2024-7553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
    },
    {
      "name": "CVE-2025-20366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20366"
    },
    {
      "name": "CVE-2025-52999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
    },
    {
      "name": "CVE-2022-37601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
    },
    {
      "name": "CVE-2025-20370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20370"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2025-20369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20369"
    },
    {
      "name": "CVE-2025-5025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
    },
    {
      "name": "CVE-2024-1351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1351"
    },
    {
      "name": "CVE-2025-20371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20371"
    },
    {
      "name": "CVE-2025-20368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20368"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2025-4947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    }
  ],
  "initial_release_date": "2025-10-02T00:00:00",
  "last_revision_date": "2025-10-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0838",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1006",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1006"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1005",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1005"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1002",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1002"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1004",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1004"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1007",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1007"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1003",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1003"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1001",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1001"
    }
  ]
}

CERTFR-2025-AVI-0473
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2411.x antérieures à 9.3.2411.102
Splunk Universal Forwarder Universal Forwarder versions 9.3.x antérieures à 9.3.4
Splunk Universal Forwarder Universal Forwarder versions 9.2.x antérieures à 9.2.6
Splunk Universal Forwarder Universal Forwarder versions 9.4.x antérieures à 9.4.2
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.9
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2408.x antérieures à 9.3.2408.111
Splunk Universal Forwarder Universal Forwarder versions 9.1.x antérieures à 9.1.9
Splunk Splunk Enterprise Splunk Enterprise versions 9.4.x antérieures à 9.4.2
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2406.x antérieures à 9.3.2406.118
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.6
Splunk Splunk Enterprise Splunk Enterprise versions 9.3.x antérieures à 9.3.4
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.102",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.4",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.6",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.2",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.9",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.111",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.9",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2406.x ant\u00e9rieures \u00e0 9.3.2406.118",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.6",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2024-53259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53259"
    },
    {
      "name": "CVE-2025-20298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20298"
    },
    {
      "name": "CVE-2024-24791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
    },
    {
      "name": "CVE-2024-35255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
    },
    {
      "name": "CVE-2024-34158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2022-31159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
    },
    {
      "name": "CVE-2025-20297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20297"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-34155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
    },
    {
      "name": "CVE-2024-24789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
    }
  ],
  "initial_release_date": "2025-06-03T00:00:00",
  "last_revision_date": "2025-06-03T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0473",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-06-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0602",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0602"
    },
    {
      "published_at": "2025-06-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0603",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0603"
    },
    {
      "published_at": "2025-06-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0601",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0601"
    },
    {
      "published_at": "2025-06-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0604",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0604"
    }
  ]
}

CERTFR-2025-AVI-0245
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.8.x antérieures à 3.8.38
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.7.x antérieures à 3.7.23
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2408.10x antérieures à 9.3.2408.107
Splunk Splunk Add-on for Microsoft Cloud Services Splunk Add-on for Microsoft Cloud Services versions 5.4.x antérieures à 5.4.3
Splunk Splunk DB Connect Splunk DB Connect versions antérieures à 4.0.0
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.8
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.x antérieures à 9.1.2312.208
Splunk Splunk Enterprise Splunk Enterprise versions 9.3.x antérieures à 9.3.3
Splunk Splunk Infrastructure Monitoring Add-on Splunk Infrastructure Monitoring Add-on versions antérieures à 1.2.7
Splunk Splunk App for Data Science and Deep Learning Splunk App for Data Science and Deep Learning versions 5.1.x antérieures à 5.2.0
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.5
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.x antérieures à 9.2.2403.115
Splunk Splunk Enterprise Splunk Enterprise versions 9.4.x antérieures à 9.4.1
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2406.10x antérieures à 9.2.2406.113
Splunk Splunk App for Lookup File Editing Splunk App for Lookup File Editing versions 4.0.x antérieures à 4.0.5
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Secure Gateway versions 3.8.x ant\u00e9rieures \u00e0 3.8.38",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Secure Gateway versions 3.7.x ant\u00e9rieures \u00e0 3.7.23",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2408.10x ant\u00e9rieures \u00e0 9.3.2408.107",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Add-on for Microsoft Cloud Services versions 5.4.x ant\u00e9rieures \u00e0 5.4.3",
      "product": {
        "name": "Splunk Add-on for Microsoft Cloud Services",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
      "product": {
        "name": "Splunk DB Connect",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise\tversions 9.1.x ant\u00e9rieures \u00e0 9.1.8",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.x ant\u00e9rieures \u00e0 9.1.2312.208",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise\tversions 9.3.x ant\u00e9rieures \u00e0 9.3.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Infrastructure Monitoring Add-on versions ant\u00e9rieures \u00e0 1.2.7",
      "product": {
        "name": "Splunk Infrastructure Monitoring Add-on",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk App for Data Science and Deep Learning versions 5.1.x ant\u00e9rieures \u00e0 5.2.0",
      "product": {
        "name": "Splunk App for Data Science and Deep Learning",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise\tversions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.x ant\u00e9rieures \u00e0 9.2.2403.115",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise\tversions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2406.10x ant\u00e9rieures \u00e0 9.2.2406.113",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk App for Lookup File Editing versions 4.0.x ant\u00e9rieures \u00e0 4.0.5",
      "product": {
        "name": "Splunk App for Lookup File Editing",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-20229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20229"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2025-20232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20232"
    },
    {
      "name": "CVE-2025-20227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20227"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2025-20226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20226"
    },
    {
      "name": "CVE-2024-38999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
    },
    {
      "name": "CVE-2025-20228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20228"
    },
    {
      "name": "CVE-2024-47875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
    },
    {
      "name": "CVE-2024-21272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-21090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
    },
    {
      "name": "CVE-2025-20231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20231"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2025-20233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20233"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2025-20230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20230"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    }
  ],
  "initial_release_date": "2025-03-27T00:00:00",
  "last_revision_date": "2025-03-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0245",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0301",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0301"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0302",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0302"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0312",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0312"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0313",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0313"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0309",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0309"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0306",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0306"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0304",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0304"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0307",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0307"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0305",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0305"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0303",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0303"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0310",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0308",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0308"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0311",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0311"
    }
  ]
}

CERTFR-2024-AVI-1061
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Universal Forwarder Splunk Universal Forwarders versions 9.1.x antérieures à 9.1.7
Splunk Universal Forwarder Splunk Universal Forwarders versions 9.2.x antérieures à 9.2.4
Splunk Universal Forwarder Splunk Universal Forwarders versions 9.3.x antérieures à 9.3.2
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2406.x antérieures à 9.2.2406.107
Splunk Splunk Enterprise Splunk Entreprise versions 9.2.x antérieures à 9.2.4
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.8.x antérieures à 3.8.5
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.111
Splunk Splunk Enterprise Splunk Entreprise versions 9.1.x antérieures à 9.1.7
Splunk Splunk Enterprise Splunk Entreprise versions 9.3.x antérieures à 9.3.2
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.4.x antérieures à 3.4.262
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2408.x antérieures à 9.3.2408.101
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.7.x antérieures à 3.7.18
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.206
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Universal Forwarders versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarders versions 9.2.x ant\u00e9rieures \u00e0 9.2.4",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarders versions 9.3.x ant\u00e9rieures \u00e0 9.3.2",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.107",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Secure Gateway versions 3.8.x ant\u00e9rieures \u00e0 3.8.5",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.111",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Secure Gateway versions 3.4.x ant\u00e9rieures \u00e0 3.4.262",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.101",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Secure Gateway versions 3.7.x ant\u00e9rieures \u00e0 3.7.18",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.206",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-42459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
    },
    {
      "name": "CVE-2024-6531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6531"
    },
    {
      "name": "CVE-2024-53245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53245"
    },
    {
      "name": "CVE-2024-42460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-53247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53247"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2024-53244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53244"
    },
    {
      "name": "CVE-2024-53243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53243"
    },
    {
      "name": "CVE-2024-36114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
    },
    {
      "name": "CVE-2024-42461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
    },
    {
      "name": "CVE-2024-36129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36129"
    },
    {
      "name": "CVE-2021-44531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44531"
    },
    {
      "name": "CVE-2024-53246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53246"
    }
  ],
  "initial_release_date": "2024-12-11T00:00:00",
  "last_revision_date": "2024-12-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1061",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1204",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1201",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1201"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1203",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1203"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1207",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1207"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1206",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1206"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1205",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1205"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1202",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1202"
    }
  ]
}

CERTFR-2024-AVI-0878
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Entreprise versions 9.2.x antérieures à 9.2.3
Splunk Splunk Enterprise Splunk Entreprise versions 9.1.x antérieures à 9.1.6
Splunk Splunk Enterprise Splunk Entreprise versions 9.3.x antérieures à 9.3.1
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.208
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.205
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.108
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.6",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.208",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.205",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.108",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2017-14159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-14159"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2020-36230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
    },
    {
      "name": "CVE-2024-45733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45733"
    },
    {
      "name": "CVE-2023-45142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
    },
    {
      "name": "CVE-2020-36221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
    },
    {
      "name": "CVE-2024-45731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45731"
    },
    {
      "name": "CVE-2019-13057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
    },
    {
      "name": "CVE-2023-45283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
    },
    {
      "name": "CVE-2023-29401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29401"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2015-3276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3276"
    },
    {
      "name": "CVE-2020-36225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
    },
    {
      "name": "CVE-2024-45739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45739"
    },
    {
      "name": "CVE-2023-39321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
    },
    {
      "name": "CVE-2023-45285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
    },
    {
      "name": "CVE-2023-45284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
    },
    {
      "name": "CVE-2020-36224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2024-24557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
    },
    {
      "name": "CVE-2021-27212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
    },
    {
      "name": "CVE-2020-36228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
    },
    {
      "name": "CVE-2020-36227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2020-15719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15719"
    },
    {
      "name": "CVE-2024-45740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45740"
    },
    {
      "name": "CVE-2024-45736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45736"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-39320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
    },
    {
      "name": "CVE-2017-17740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-17740"
    },
    {
      "name": "CVE-2024-45741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45741"
    },
    {
      "name": "CVE-2020-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
    },
    {
      "name": "CVE-2023-39318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
    },
    {
      "name": "CVE-2020-36223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
    },
    {
      "name": "CVE-2023-3978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
    },
    {
      "name": "CVE-2024-45737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45737"
    },
    {
      "name": "CVE-2020-36229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-39319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
    },
    {
      "name": "CVE-2024-45732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45732"
    },
    {
      "name": "CVE-2022-29155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-45735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45735"
    },
    {
      "name": "CVE-2023-50658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50658"
    },
    {
      "name": "CVE-2023-47108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47108"
    },
    {
      "name": "CVE-2023-26125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26125"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2024-45738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45738"
    },
    {
      "name": "CVE-2020-36226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
    },
    {
      "name": "CVE-2020-36222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
    },
    {
      "name": "CVE-2023-39322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
    },
    {
      "name": "CVE-2022-42969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2019-13565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
    },
    {
      "name": "CVE-2023-39323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
    },
    {
      "name": "CVE-2023-39326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2024-24786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
    },
    {
      "name": "CVE-2024-45734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45734"
    },
    {
      "name": "CVE-2020-25692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
    }
  ],
  "initial_release_date": "2024-10-15T00:00:00",
  "last_revision_date": "2024-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0878",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1008",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1008"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1005",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1005"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1006",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1006"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1002",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1002"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1003",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1003"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1007",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1007"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1004",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1004"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1010",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1010"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1011",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1011"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1012",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1012"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1009",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1009"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1001",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1001"
    }
  ]
}

CERTFR-2024-AVI-0541
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.2
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.109
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 9.1.2308.207
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.5
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.109",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 9.1.2308.207",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-36982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36982"
    },
    {
      "name": "CVE-2023-33733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33733"
    }
  ],
  "initial_release_date": "2024-07-04T00:00:00",
  "last_revision_date": "2024-07-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0541",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0702",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0702"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0701",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0701"
    }
  ]
}

CERTFR-2024-AVI-0535
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.209
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.2
Splunk Universal Forwarder Universal Forwarder sur Solaris versions 9.0.x antérieures à 9.0.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.5
Splunk Universal Forwarder Universal Forwarder sur Solaris versions 9.2.x antérieures à 9.2.2
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.202
Splunk Universal Forwarder Universal Forwarder sur Solaris versions 9.1.x antérieures à 9.1.5
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.209",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder sur Solaris versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder sur Solaris versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.202",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder sur Solaris versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-40899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
    },
    {
      "name": "CVE-2024-36996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36996"
    },
    {
      "name": "CVE-2021-29425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
    },
    {
      "name": "CVE-2023-43642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2024-36985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36985"
    },
    {
      "name": "CVE-2022-36364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
    },
    {
      "name": "CVE-2024-36989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36989"
    },
    {
      "name": "CVE-2023-34454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
    },
    {
      "name": "CVE-2023-47627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
    },
    {
      "name": "CVE-2024-36991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36991"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2023-34453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
    },
    {
      "name": "CVE-2024-36983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36983"
    },
    {
      "name": "CVE-2023-35116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
    },
    {
      "name": "CVE-2024-36992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36992"
    },
    {
      "name": "CVE-2024-36995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36995"
    },
    {
      "name": "CVE-2023-37276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
    },
    {
      "name": "CVE-2024-36993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36993"
    },
    {
      "name": "CVE-2023-34455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
    },
    {
      "name": "CVE-2024-36984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36984"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-39410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
    },
    {
      "name": "CVE-2018-10237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2024-36994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36994"
    },
    {
      "name": "CVE-2020-8908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
    },
    {
      "name": "CVE-2024-36987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36987"
    },
    {
      "name": "CVE-2022-40896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40896"
    },
    {
      "name": "CVE-2024-36986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36986"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-36997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36997"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    },
    {
      "name": "CVE-2022-40898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2023-5752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
    },
    {
      "name": "CVE-2024-36990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36990"
    }
  ],
  "initial_release_date": "2024-07-02T00:00:00",
  "last_revision_date": "2024-07-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0535",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0711",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0711"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0718",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0716",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0716"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0709",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0709"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0707",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0707"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0704",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0704"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0710",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0710"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0717",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0717"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0705",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0705"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0715",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0715"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0712",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0712"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0714",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0714"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0703",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0703"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0708",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0708"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0713",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0713"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0706",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0706"
    }
  ]
}

CERTFR-2024-AVI-0258
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 9.1.2312.100
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.9
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.1
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.4

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 9.1.2312.100",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.9",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-29945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29945"
    },
    {
      "name": "CVE-2024-29946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29946"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2021-32559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32559"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    }
  ],
  "initial_release_date": "2024-03-28T00:00:00",
  "last_revision_date": "2024-03-28T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0258",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-03-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSplunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0302 du 27 mars 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0302"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0303 du 27 mars 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0303"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0304 du 27 mars 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0304"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0301 du 27 mars 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0301"
    }
  ]
}

CERTFR-2023-AVI-0142
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans Splunk. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 9.0.2209.3
Splunk N/A Splunk Add-on Builder versions antérieures à 4.1.2
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.4
Splunk N/A Splunk CloudConnect SDK versions antérieures à 3.1.3
Splunk Splunk Enterprise Splunk Enterprise versions 8.1.x antérieures à 8.1.13
References
Bulletin de sécurité Splunk SVD-2023-0209 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0201 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0202 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0213 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0207 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0212 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0206 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0210 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0211 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0204 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0205 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0215 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0208 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0203 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0203 du 14 février 2023 - other
Bulletin de sécurité Splunk SVD-2023-0210 du 14 février 2023 - other
Bulletin de sécurité Splunk SVD-2023-0205 du 14 février 2023 - other
Bulletin de sécurité Splunk SVD-2023-0202 du 14 février 2023 - other
Bulletin de sécurité Splunk SVD-2023-0215 du 14 février 2023 - other

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 9.0.2209.3",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Add-on Builder versions ant\u00e9rieures \u00e0 4.1.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk CloudConnect SDK versions ant\u00e9rieures \u00e0 3.1.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-31129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
    },
    {
      "name": "CVE-2023-22940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22940"
    },
    {
      "name": "CVE-2023-22938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22938"
    },
    {
      "name": "CVE-2021-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
    },
    {
      "name": "CVE-2023-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22942"
    },
    {
      "name": "CVE-2021-3537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
    },
    {
      "name": "CVE-2021-28957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28957"
    },
    {
      "name": "CVE-2023-22936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22936"
    },
    {
      "name": "CVE-2023-22934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22934"
    },
    {
      "name": "CVE-2023-22937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22937"
    },
    {
      "name": "CVE-2022-32212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32212"
    },
    {
      "name": "CVE-2022-24785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
    },
    {
      "name": "CVE-2023-22933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22933"
    },
    {
      "name": "CVE-2023-22932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22932"
    },
    {
      "name": "CVE-2023-22935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22935"
    },
    {
      "name": "CVE-2021-21419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21419"
    },
    {
      "name": "CVE-2023-22931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22931"
    },
    {
      "name": "CVE-2023-22943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22943"
    },
    {
      "name": "CVE-2023-22941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22941"
    },
    {
      "name": "CVE-2023-22939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22939"
    },
    {
      "name": "CVE-2015-20107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
    },
    {
      "name": "CVE-2021-3518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
    }
  ],
  "initial_release_date": "2023-02-17T00:00:00",
  "last_revision_date": "2023-02-17T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0203 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0203"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0210 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0210"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0205 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0205"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0202 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0202"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0215 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0215"
    }
  ],
  "reference": "CERTFR-2023-AVI-0142",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-02-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSplunk\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une injection de code indirecte \u00e0 distance\n(XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0209 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0209"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0201 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0201"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0202 du 14 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0213 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0213"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0207 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0207"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0212 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0212"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0206 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0206"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0210 du 14 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0211 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0211"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0204 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0204"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0205 du 14 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0215 du 14 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0208 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0208"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0203 du 14 f\u00e9vrier 2023",
      "url": null
    }
  ]
}

CERTFR-2022-AVI-986
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 8.1.x antérieures à 8.1.12
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.9
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.0.x antérieures à 9.0.2211
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 8.1.x ant\u00e9rieures \u00e0 8.1.12",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.9",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.0.x ant\u00e9rieures \u00e0 9.0.2211",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-43566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43566"
    },
    {
      "name": "CVE-2022-43563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43563"
    },
    {
      "name": "CVE-2022-43571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43571"
    },
    {
      "name": "CVE-2022-43568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43568"
    },
    {
      "name": "CVE-2022-43569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43569"
    },
    {
      "name": "CVE-2022-43564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43564"
    },
    {
      "name": "CVE-2022-43561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43561"
    },
    {
      "name": "CVE-2022-43565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43565"
    },
    {
      "name": "CVE-2020-36518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
    },
    {
      "name": "CVE-2022-43572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43572"
    },
    {
      "name": "CVE-2022-43570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43570"
    },
    {
      "name": "CVE-2022-43567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43567"
    },
    {
      "name": "CVE-2022-43562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43562"
    }
  ],
  "initial_release_date": "2022-11-03T00:00:00",
  "last_revision_date": "2022-11-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-986",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-11-03T00:00:00.000000"
    },
    {
      "description": "Correction num\u00e9ro de CVE : CVE-2022-36518 remplac\u00e9 par CVE-2020-36518",
      "revision_date": "2022-11-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1102 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1102.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1106 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1104 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1104.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1101 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1101.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1113 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1113.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1112 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1112.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1109 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1109.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1111 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1103 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1103.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1105 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1105.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1110 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1110.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1107 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1108 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.html"
    }
  ]
}

CERTFR-2022-AVI-746
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.1
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 9.0.2205
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.7.1
Splunk Splunk Enterprise Splunk Enterprise versions 8.1.x antérieures à 8.1.11
Splunk N/A Universal Forwarders versions 8.2.x antérieures à 8.2.7.1
Splunk N/A Universal Forwarders versions 9.0.x antérieures à 9.0.1
Splunk N/A Universal Forwarders versions 8.1.x antérieures à 8.1.11

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 9.0.2205",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.7.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.1.x ant\u00e9rieures \u00e0 8.1.11",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarders versions 8.2.x ant\u00e9rieures \u00e0 8.2.7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarders versions 9.0.x ant\u00e9rieures \u00e0 9.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarders versions 8.1.x ant\u00e9rieures \u00e0 8.1.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2022-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
    },
    {
      "name": "CVE-2022-37438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37438"
    },
    {
      "name": "CVE-2022-209824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-209824"
    },
    {
      "name": "CVE-2022-23308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
    },
    {
      "name": "CVE-2022-37439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37439"
    },
    {
      "name": "CVE-2022-37437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37437"
    },
    {
      "name": "CVE-2021-3541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
    },
    {
      "name": "CVE-2022-233089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-233089"
    }
  ],
  "initial_release_date": "2022-08-17T00:00:00",
  "last_revision_date": "2022-08-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-746",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0801 du 16 ao\u00fbt 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0804 du 16 ao\u00fbt 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0804.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0803 du 16 ao\u00fbt 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0803.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0802 du 16 ao\u00fbt 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0802.html"
    }
  ]
}

CERTFR-2022-AVI-548
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Universal Forwarder Universal Forwarder versions antérieures à 9.0
Splunk Splunk Enterprise Splunk Enterprise versions antérieures à 9.0
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 8.2.2203

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Universal Forwarder versions ant\u00e9rieures \u00e0 9.0",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions ant\u00e9rieures \u00e0 9.0",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 8.2.2203",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-32152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32152"
    },
    {
      "name": "CVE-2022-32151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32151"
    },
    {
      "name": "CVE-2022-32155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32155"
    },
    {
      "name": "CVE-2022-32156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32156"
    },
    {
      "name": "CVE-2022-32154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32154"
    },
    {
      "name": "CVE-2022-32153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32153"
    },
    {
      "name": "CVE-2022-32158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32158"
    },
    {
      "name": "CVE-2022-32157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32157"
    }
  ],
  "initial_release_date": "2022-06-15T00:00:00",
  "last_revision_date": "2022-06-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-548",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-06-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSplunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0604 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0603 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0603.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0605 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0605.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0601 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0601.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0602 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0607 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0608 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0608.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0606 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html"
    }
  ]
}