Refine your search

21 vulnerabilities found for Splunk Enterprise by Splunk

CERTFR-2025-AVI-0838
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.109
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2406 antérieures à 9.2.2406.123
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.119
Splunk Splunk Enterprise Splunk Enterprise versions 10.0.x antérieures à 10.0.1
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.2.2406 antérieures à 9.2.2406.123
Splunk Splunk Enterprise Splunk Enterprise versions 10.0.x antérieures à 10.0.0
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.8
Splunk Splunk Enterprise Splunk Enterprise versions 9.4.x antérieures à 9.4.4
Splunk Splunk Enterprise Splunk Enterprise versions 9.3.x antérieures à 9.3.6
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.3.2411 antérieures à 9.3.2411.108
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.3.2408 antérieures à 9.3.2408.118
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.111
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.109",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.119",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.0",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.8",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.6",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.108",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.118",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.111",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-44906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
    },
    {
      "name": "CVE-2022-46175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
    },
    {
      "name": "CVE-2015-5237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
    },
    {
      "name": "CVE-2025-20367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20367"
    },
    {
      "name": "CVE-2024-7553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
    },
    {
      "name": "CVE-2025-20366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20366"
    },
    {
      "name": "CVE-2025-52999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
    },
    {
      "name": "CVE-2022-37601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
    },
    {
      "name": "CVE-2025-20370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20370"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2025-20369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20369"
    },
    {
      "name": "CVE-2025-5025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
    },
    {
      "name": "CVE-2024-1351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1351"
    },
    {
      "name": "CVE-2025-20371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20371"
    },
    {
      "name": "CVE-2025-20368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20368"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2025-4947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    }
  ],
  "initial_release_date": "2025-10-02T00:00:00",
  "last_revision_date": "2025-10-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0838",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1006",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1006"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1005",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1005"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1002",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1002"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1004",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1004"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1007",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1007"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1003",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1003"
    },
    {
      "published_at": "2025-10-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1001",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-1001"
    }
  ]
}

CERTFR-2025-AVI-0563
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.3.2411.x antérieures à 9.3.2411.107
Splunk SOAR Splunk SOAR versions antérieures à 6.4.1
Splunk Splunk Enterprise Splunk Enterprise versions 9.4.x antérieures à 9.4.3
Splunk Universal Forwarder Splunk Universal Forwarder versions 9.2.x antérieures à 9.2.7
Splunk Splunk Enterprise Splunk Enterprise versions 9.3.x antérieures à 9.3.5
Splunk Splunk DB Connect Splunk DB Connect versions antérieures à 4.0.0
Splunk Universal Forwarder Splunk Universal Forwarder versions 9.3.x antérieures à 9.3.5
Splunk Universal Forwarder Splunk Universal Forwarder versions 9.4.x antérieures à 9.4.3
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.3.2408.x antérieures à 9.3.2408.117
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.7
Splunk Splunk Enterprise Splunk Enterprise Cloud versions 9.2.2406.x antérieures à 9.2.2406.121
Splunk Universal Forwarder Splunk Universal Forwarder versions 9.1.x antérieures à 9.1.10
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.107",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk SOAR versions ant\u00e9rieures \u00e0 6.4.1",
      "product": {
        "name": "SOAR",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
      "product": {
        "name": "Splunk DB Connect",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.117",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.121",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2022-30187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
    },
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2024-2466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
    },
    {
      "name": "CVE-2025-27414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27414"
    },
    {
      "name": "CVE-2025-20324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20324"
    },
    {
      "name": "CVE-2025-23388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23388"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-20319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20319"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2020-28458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
    },
    {
      "name": "CVE-2025-20321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20321"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2025-20325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20325"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-23387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23387"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2021-23445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
    },
    {
      "name": "CVE-2024-48949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
    },
    {
      "name": "CVE-2025-23389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23389"
    },
    {
      "name": "CVE-2024-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
    },
    {
      "name": "CVE-2022-35583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35583"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2024-52804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
    },
    {
      "name": "CVE-2025-20300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20300"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-20323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20323"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
    },
    {
      "name": "CVE-2025-20320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20320"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-45230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45230"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-47875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
    },
    {
      "name": "CVE-2025-20322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20322"
    },
    {
      "name": "CVE-2024-21272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-21090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
    },
    {
      "name": "CVE-2013-7489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
    },
    {
      "name": "CVE-2025-27789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2024-52616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
    },
    {
      "name": "CVE-2024-0853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0853"
    },
    {
      "name": "CVE-2025-22952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22952"
    },
    {
      "name": "CVE-2024-32002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    }
  ],
  "initial_release_date": "2025-07-08T00:00:00",
  "last_revision_date": "2025-07-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0563",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0708",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0708"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0703",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0703"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0701",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0701"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0706",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0706"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0705",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0705"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0702",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0702"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0712",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0712"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0711",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0711"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0707",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0707"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0710",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0710"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0709",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0709"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0704",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0704"
    }
  ]
}

CERTFR-2025-AVI-0473
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2411.x antérieures à 9.3.2411.102
Splunk Universal Forwarder Universal Forwarder versions 9.3.x antérieures à 9.3.4
Splunk Universal Forwarder Universal Forwarder versions 9.2.x antérieures à 9.2.6
Splunk Universal Forwarder Universal Forwarder versions 9.4.x antérieures à 9.4.2
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.9
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2408.x antérieures à 9.3.2408.111
Splunk Universal Forwarder Universal Forwarder versions 9.1.x antérieures à 9.1.9
Splunk Splunk Enterprise Splunk Enterprise versions 9.4.x antérieures à 9.4.2
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2406.x antérieures à 9.3.2406.118
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.6
Splunk Splunk Enterprise Splunk Enterprise versions 9.3.x antérieures à 9.3.4
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.102",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.4",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.6",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.2",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.9",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.111",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.9",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2406.x ant\u00e9rieures \u00e0 9.3.2406.118",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.6",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2024-53259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53259"
    },
    {
      "name": "CVE-2025-20298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20298"
    },
    {
      "name": "CVE-2024-24791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
    },
    {
      "name": "CVE-2024-35255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
    },
    {
      "name": "CVE-2024-34158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2022-31159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
    },
    {
      "name": "CVE-2025-20297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20297"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-34155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
    },
    {
      "name": "CVE-2024-24789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
    }
  ],
  "initial_release_date": "2025-06-03T00:00:00",
  "last_revision_date": "2025-06-03T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0473",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-06-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0602",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0602"
    },
    {
      "published_at": "2025-06-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0603",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0603"
    },
    {
      "published_at": "2025-06-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0601",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0601"
    },
    {
      "published_at": "2025-06-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0604",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0604"
    }
  ]
}

CERTFR-2025-AVI-0272
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Enterprise image docker splunk/splunk versions 9.2.x antérieures à 9.2.5
Splunk Universal Forwarder image docker splunk/universalforwarder versions 9.3.x antérieures à 9.3.3
Splunk Universal Forwarder image docker splunk/universalforwarder versions 9.2.x antérieures à 9.2.5
Splunk Splunk Enterprise image docker splunk/splunk versions 9.1.x antérieures à 9.1.8
Splunk Universal Forwarder image docker splunk/universalforwarder versions 9.4.x antérieures à 9.4.1
Splunk Universal Forwarder image docker splunk/universalforwarder versions 9.1.x antérieures à 9.1.8
Splunk Splunk Enterprise image docker splunk/splunk versions 9.3.x antérieures à 9.3.3
Splunk Splunk Enterprise image docker splunk/splunk versions 9.4.x antérieures à 9.4.1
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "image docker splunk/splunk versions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "image docker splunk/universalforwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.3",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "image docker splunk/universalforwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "image docker splunk/splunk versions 9.1.x ant\u00e9rieures \u00e0 9.1.8",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "image docker splunk/universalforwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "image docker splunk/universalforwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.8",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "image docker splunk/splunk versions 9.3.x ant\u00e9rieures \u00e0 9.3.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "image docker splunk/splunk versions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-56326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-56201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
    }
  ],
  "initial_release_date": "2025-04-03T00:00:00",
  "last_revision_date": "2025-04-03T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0272",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-04-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0401",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0401"
    },
    {
      "published_at": "2025-04-02",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0402",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0402"
    }
  ]
}

CERTFR-2025-AVI-0245
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.8.x antérieures à 3.8.38
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.7.x antérieures à 3.7.23
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2408.10x antérieures à 9.3.2408.107
Splunk Splunk Add-on for Microsoft Cloud Services Splunk Add-on for Microsoft Cloud Services versions 5.4.x antérieures à 5.4.3
Splunk Splunk DB Connect Splunk DB Connect versions antérieures à 4.0.0
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.8
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.x antérieures à 9.1.2312.208
Splunk Splunk Enterprise Splunk Enterprise versions 9.3.x antérieures à 9.3.3
Splunk Splunk Infrastructure Monitoring Add-on Splunk Infrastructure Monitoring Add-on versions antérieures à 1.2.7
Splunk Splunk App for Data Science and Deep Learning Splunk App for Data Science and Deep Learning versions 5.1.x antérieures à 5.2.0
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.5
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.x antérieures à 9.2.2403.115
Splunk Splunk Enterprise Splunk Enterprise versions 9.4.x antérieures à 9.4.1
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2406.10x antérieures à 9.2.2406.113
Splunk Splunk App for Lookup File Editing Splunk App for Lookup File Editing versions 4.0.x antérieures à 4.0.5
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Secure Gateway versions 3.8.x ant\u00e9rieures \u00e0 3.8.38",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Secure Gateway versions 3.7.x ant\u00e9rieures \u00e0 3.7.23",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2408.10x ant\u00e9rieures \u00e0 9.3.2408.107",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Add-on for Microsoft Cloud Services versions 5.4.x ant\u00e9rieures \u00e0 5.4.3",
      "product": {
        "name": "Splunk Add-on for Microsoft Cloud Services",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
      "product": {
        "name": "Splunk DB Connect",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise\tversions 9.1.x ant\u00e9rieures \u00e0 9.1.8",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.x ant\u00e9rieures \u00e0 9.1.2312.208",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise\tversions 9.3.x ant\u00e9rieures \u00e0 9.3.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Infrastructure Monitoring Add-on versions ant\u00e9rieures \u00e0 1.2.7",
      "product": {
        "name": "Splunk Infrastructure Monitoring Add-on",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk App for Data Science and Deep Learning versions 5.1.x ant\u00e9rieures \u00e0 5.2.0",
      "product": {
        "name": "Splunk App for Data Science and Deep Learning",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise\tversions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.x ant\u00e9rieures \u00e0 9.2.2403.115",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise\tversions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2406.10x ant\u00e9rieures \u00e0 9.2.2406.113",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk App for Lookup File Editing versions 4.0.x ant\u00e9rieures \u00e0 4.0.5",
      "product": {
        "name": "Splunk App for Lookup File Editing",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-20229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20229"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2025-20232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20232"
    },
    {
      "name": "CVE-2025-20227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20227"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2025-20226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20226"
    },
    {
      "name": "CVE-2024-38999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
    },
    {
      "name": "CVE-2025-20228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20228"
    },
    {
      "name": "CVE-2024-47875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
    },
    {
      "name": "CVE-2024-21272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-21090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
    },
    {
      "name": "CVE-2025-20231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20231"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2025-20233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20233"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2025-20230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20230"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    }
  ],
  "initial_release_date": "2025-03-27T00:00:00",
  "last_revision_date": "2025-03-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0245",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0301",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0301"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0302",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0302"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0312",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0312"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0313",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0313"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0309",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0309"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0306",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0306"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0304",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0304"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0307",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0307"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0305",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0305"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0303",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0303"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0310",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0310"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0308",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0308"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0311",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0311"
    }
  ]
}

CERTFR-2024-AVI-1061
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Universal Forwarder Splunk Universal Forwarders versions 9.1.x antérieures à 9.1.7
Splunk Universal Forwarder Splunk Universal Forwarders versions 9.2.x antérieures à 9.2.4
Splunk Universal Forwarder Splunk Universal Forwarders versions 9.3.x antérieures à 9.3.2
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2406.x antérieures à 9.2.2406.107
Splunk Splunk Enterprise Splunk Entreprise versions 9.2.x antérieures à 9.2.4
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.8.x antérieures à 3.8.5
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.111
Splunk Splunk Enterprise Splunk Entreprise versions 9.1.x antérieures à 9.1.7
Splunk Splunk Enterprise Splunk Entreprise versions 9.3.x antérieures à 9.3.2
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.4.x antérieures à 3.4.262
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.3.2408.x antérieures à 9.3.2408.101
Splunk Splunk Secure Gateway Splunk Secure Gateway versions 3.7.x antérieures à 3.7.18
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.206
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Universal Forwarders versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarders versions 9.2.x ant\u00e9rieures \u00e0 9.2.4",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarders versions 9.3.x ant\u00e9rieures \u00e0 9.3.2",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.107",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Secure Gateway versions 3.8.x ant\u00e9rieures \u00e0 3.8.5",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.111",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.7",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Secure Gateway versions 3.4.x ant\u00e9rieures \u00e0 3.4.262",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.101",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Secure Gateway versions 3.7.x ant\u00e9rieures \u00e0 3.7.18",
      "product": {
        "name": "Splunk Secure Gateway",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.206",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-42459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
    },
    {
      "name": "CVE-2024-6531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6531"
    },
    {
      "name": "CVE-2024-53245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53245"
    },
    {
      "name": "CVE-2024-42460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-53247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53247"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2024-53244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53244"
    },
    {
      "name": "CVE-2024-53243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53243"
    },
    {
      "name": "CVE-2024-36114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
    },
    {
      "name": "CVE-2024-42461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
    },
    {
      "name": "CVE-2024-36129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36129"
    },
    {
      "name": "CVE-2021-44531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44531"
    },
    {
      "name": "CVE-2024-53246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53246"
    }
  ],
  "initial_release_date": "2024-12-11T00:00:00",
  "last_revision_date": "2024-12-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1061",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1204",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1201",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1201"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1203",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1203"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1207",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1207"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1206",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1206"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1205",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1205"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1202",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1202"
    }
  ]
}

CERTFR-2024-AVI-0878
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Entreprise versions 9.2.x antérieures à 9.2.3
Splunk Splunk Enterprise Splunk Entreprise versions 9.1.x antérieures à 9.1.6
Splunk Splunk Enterprise Splunk Entreprise versions 9.3.x antérieures à 9.3.1
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.208
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.205
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.108
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.6",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.208",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.205",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.108",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2017-14159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-14159"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2020-36230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
    },
    {
      "name": "CVE-2024-45733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45733"
    },
    {
      "name": "CVE-2023-45142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
    },
    {
      "name": "CVE-2020-36221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
    },
    {
      "name": "CVE-2024-45731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45731"
    },
    {
      "name": "CVE-2019-13057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
    },
    {
      "name": "CVE-2023-45283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
    },
    {
      "name": "CVE-2023-29401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29401"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2015-3276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-3276"
    },
    {
      "name": "CVE-2020-36225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
    },
    {
      "name": "CVE-2024-45739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45739"
    },
    {
      "name": "CVE-2023-39321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
    },
    {
      "name": "CVE-2023-45285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
    },
    {
      "name": "CVE-2023-45284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
    },
    {
      "name": "CVE-2020-36224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2024-24557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
    },
    {
      "name": "CVE-2021-27212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
    },
    {
      "name": "CVE-2020-36228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
    },
    {
      "name": "CVE-2020-36227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2020-15719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15719"
    },
    {
      "name": "CVE-2024-45740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45740"
    },
    {
      "name": "CVE-2024-45736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45736"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-39320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
    },
    {
      "name": "CVE-2017-17740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-17740"
    },
    {
      "name": "CVE-2024-45741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45741"
    },
    {
      "name": "CVE-2020-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
    },
    {
      "name": "CVE-2023-39318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
    },
    {
      "name": "CVE-2020-36223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
    },
    {
      "name": "CVE-2023-3978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
    },
    {
      "name": "CVE-2024-45737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45737"
    },
    {
      "name": "CVE-2020-36229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-39319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
    },
    {
      "name": "CVE-2024-45732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45732"
    },
    {
      "name": "CVE-2022-29155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-45735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45735"
    },
    {
      "name": "CVE-2023-50658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50658"
    },
    {
      "name": "CVE-2023-47108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47108"
    },
    {
      "name": "CVE-2023-26125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26125"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2024-45738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45738"
    },
    {
      "name": "CVE-2020-36226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
    },
    {
      "name": "CVE-2020-36222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
    },
    {
      "name": "CVE-2023-39322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
    },
    {
      "name": "CVE-2022-42969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2019-13565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
    },
    {
      "name": "CVE-2023-39323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
    },
    {
      "name": "CVE-2023-39326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2024-24786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
    },
    {
      "name": "CVE-2024-45734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45734"
    },
    {
      "name": "CVE-2020-25692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
    }
  ],
  "initial_release_date": "2024-10-15T00:00:00",
  "last_revision_date": "2024-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0878",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1008",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1008"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1005",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1005"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1006",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1006"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1002",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1002"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1003",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1003"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1007",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1007"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1004",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1004"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1010",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1010"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1011",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1011"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1012",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1012"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1009",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1009"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1001",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-1001"
    }
  ]
}

CERTFR-2024-AVI-0541
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.2
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.109
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 9.1.2308.207
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.5
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.109",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 9.1.2308.207",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-36982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36982"
    },
    {
      "name": "CVE-2023-33733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33733"
    }
  ],
  "initial_release_date": "2024-07-04T00:00:00",
  "last_revision_date": "2024-07-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0541",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0702",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0702"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0701",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0701"
    }
  ]
}

CERTFR-2024-AVI-0535
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.209
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.2
Splunk Universal Forwarder Universal Forwarder sur Solaris versions 9.0.x antérieures à 9.0.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.5
Splunk Universal Forwarder Universal Forwarder sur Solaris versions 9.2.x antérieures à 9.2.2
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.202
Splunk Universal Forwarder Universal Forwarder sur Solaris versions 9.1.x antérieures à 9.1.5
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.209",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder sur Solaris versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder sur Solaris versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.202",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder sur Solaris versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-40899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
    },
    {
      "name": "CVE-2024-36996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36996"
    },
    {
      "name": "CVE-2021-29425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
    },
    {
      "name": "CVE-2023-43642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2024-36985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36985"
    },
    {
      "name": "CVE-2022-36364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
    },
    {
      "name": "CVE-2024-36989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36989"
    },
    {
      "name": "CVE-2023-34454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
    },
    {
      "name": "CVE-2023-47627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
    },
    {
      "name": "CVE-2024-36991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36991"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2023-34453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
    },
    {
      "name": "CVE-2024-36983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36983"
    },
    {
      "name": "CVE-2023-35116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
    },
    {
      "name": "CVE-2024-36992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36992"
    },
    {
      "name": "CVE-2024-36995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36995"
    },
    {
      "name": "CVE-2023-37276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
    },
    {
      "name": "CVE-2024-36993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36993"
    },
    {
      "name": "CVE-2023-34455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
    },
    {
      "name": "CVE-2024-36984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36984"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-39410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
    },
    {
      "name": "CVE-2018-10237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2024-36994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36994"
    },
    {
      "name": "CVE-2020-8908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
    },
    {
      "name": "CVE-2024-36987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36987"
    },
    {
      "name": "CVE-2022-40896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40896"
    },
    {
      "name": "CVE-2024-36986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36986"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-36997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36997"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    },
    {
      "name": "CVE-2022-40898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2023-5752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
    },
    {
      "name": "CVE-2024-36990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36990"
    }
  ],
  "initial_release_date": "2024-07-02T00:00:00",
  "last_revision_date": "2024-07-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0535",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0711",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0711"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0718",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0716",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0716"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0709",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0709"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0707",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0707"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0704",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0704"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0710",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0710"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0717",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0717"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0705",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0705"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0715",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0715"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0712",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0712"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0714",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0714"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0703",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0703"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0708",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0708"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0713",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0713"
    },
    {
      "published_at": "2024-07-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0706",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0706"
    }
  ]
}

CERTFR-2024-AVI-0258
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 9.1.2312.100
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.9
Splunk Splunk Enterprise Splunk Enterprise versions 9.2.x antérieures à 9.2.1
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.4

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 9.1.2312.100",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.9",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-29945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29945"
    },
    {
      "name": "CVE-2024-29946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29946"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2021-32559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32559"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    }
  ],
  "initial_release_date": "2024-03-28T00:00:00",
  "last_revision_date": "2024-03-28T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0258",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-03-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSplunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0302 du 27 mars 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0302"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0303 du 27 mars 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0303"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0304 du 27 mars 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0304"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0301 du 27 mars 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0301"
    }
  ]
}

CERTFR-2024-AVI-0061
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.3
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.8
Splunk N/A Splunk Cloud versions antérieures à 9.1.2312.200

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.8",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.1.2312.200",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-40899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
    },
    {
      "name": "CVE-2024-23676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23676"
    },
    {
      "name": "CVE-2024-23675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23675"
    },
    {
      "name": "CVE-2023-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2023-29403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
    },
    {
      "name": "CVE-2023-29405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
    },
    {
      "name": "CVE-2023-29406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
    },
    {
      "name": "CVE-2024-23678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23678"
    },
    {
      "name": "CVE-2023-39323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
    },
    {
      "name": "CVE-2023-29402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
    },
    {
      "name": "CVE-2023-29409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
    },
    {
      "name": "CVE-2024-23677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23677"
    }
  ],
  "initial_release_date": "2024-01-23T00:00:00",
  "last_revision_date": "2024-01-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0061",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-01-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Splunk\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0105 du 22 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0105"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0108 du 22 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0108"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0106 du 22 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0106"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0107 du 22 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0107"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0109 du 22 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0109"
    }
  ]
}

CERTFR-2024-AVI-0015
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk N/A Splunk User Behavior Analytics (UBA) versions antérieures à 5.2.1
Splunk Splunk Enterprise Splunk Enterprise Security (ES) versions antérieures à 7.1.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk User Behavior Analytics (UBA) versions ant\u00e9rieures \u00e0 5.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Security (ES) versions ant\u00e9rieures \u00e0 7.1.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-46175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
    },
    {
      "name": "CVE-2015-5237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
    },
    {
      "name": "CVE-2022-37603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
    },
    {
      "name": "CVE-2021-23446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23446"
    },
    {
      "name": "CVE-2022-25883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
    },
    {
      "name": "CVE-2023-32695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32695"
    },
    {
      "name": "CVE-2023-45133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
    },
    {
      "name": "CVE-2024-22164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22164"
    },
    {
      "name": "CVE-2022-3510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
    },
    {
      "name": "CVE-2022-3509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
    },
    {
      "name": "CVE-2022-37601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
    },
    {
      "name": "CVE-2024-22165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22165"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    },
    {
      "name": "CVE-2022-37599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
    },
    {
      "name": "CVE-2022-3171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
    }
  ],
  "initial_release_date": "2024-01-10T00:00:00",
  "last_revision_date": "2024-01-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0015",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-01-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSplunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0103 du 09 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0103"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0104 du 09 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0104"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0102 du 09 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0102"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0101 du 09 janvier 2024",
      "url": "https://advisory.splunk.com/advisories/SVD-2024-0101"
    }
  ]
}

CERTFR-2023-AVI-0956
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk N/A Splunk extension pour Google Cloud Platform versions antérieures à 4.3.0
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.2
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.7
Splunk N/A Splunk extension pour Amazon Web Services versions antérieures à 7.2.0
Splunk N/A Splunk Cloud versions antérieures à 9.1.2308

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk extension pour Google Cloud Platform versions ant\u00e9rieures \u00e0 4.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.7",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk extension pour Amazon Web Services versions ant\u00e9rieures \u00e0 7.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.1.2308",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2023-3817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
    },
    {
      "name": "CVE-2022-25883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
    },
    {
      "name": "CVE-2023-44270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
    },
    {
      "name": "CVE-2023-46213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46213"
    },
    {
      "name": "CVE-2023-46214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46214"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2021-22570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2022-31799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31799"
    }
  ],
  "initial_release_date": "2023-11-17T00:00:00",
  "last_revision_date": "2023-11-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0956",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Splunk\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et une injection\nde code indirecte \u00e0 distance (XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1105 du 16 novembre 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-1105"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1101 du 16 novembre 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-1101"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1102 du 16 novembre 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-1102"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1106 du 16 novembre 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-1106"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1103 du 16 novembre 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-1103"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1104 du 16 novembre 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-1104"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1107 du 16 novembre 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-1107"
    }
  ]
}

CERTFR-2023-AVI-0701
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Universal Forwarder Universal Forwarder versions 9.0.x antérieures à 9.0.6
Splunk N/A Splunk ITSI versions 4.15.x antérieures à 4.15.3
Splunk Universal Forwarder Universal Forwarder versions 8.2.x antérieures à 8.2.12
Splunk N/A Splunk Cloud versions antérieures à 9.0.2305.200
Splunk Universal Forwarder Universal Forwarder versions 9.1.x antérieures à 9.1.1
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.12
Splunk N/A Splunk ITSI versions 4.13.x antérieures à 4.13.3
Splunk Splunk Enterprise Splunk Enterprise versions 9.1.x antérieures à 9.1.1
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.6

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Universal Forwarder versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk ITSI versions 4.15.x ant\u00e9rieures \u00e0 4.15.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.0.2305.200",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.12",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk ITSI versions 4.13.x ant\u00e9rieures \u00e0 4.13.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.6",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
    },
    {
      "name": "CVE-2022-40899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
    },
    {
      "name": "CVE-2022-35252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
    },
    {
      "name": "CVE-2022-31129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
    },
    {
      "name": "CVE-2022-32189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
    },
    {
      "name": "CVE-2021-27919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27919"
    },
    {
      "name": "CVE-2019-20454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20454"
    },
    {
      "name": "CVE-2021-29425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
    },
    {
      "name": "CVE-2022-30631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
    },
    {
      "name": "CVE-2022-27191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
    },
    {
      "name": "CVE-2022-46175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
    },
    {
      "name": "CVE-2020-8169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
    },
    {
      "name": "CVE-2022-27781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
    },
    {
      "name": "CVE-2021-22925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
    },
    {
      "name": "CVE-2021-3572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
    },
    {
      "name": "CVE-2023-4571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4571"
    },
    {
      "name": "CVE-2022-35260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
    },
    {
      "name": "CVE-2023-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
    },
    {
      "name": "CVE-2022-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27536"
    },
    {
      "name": "CVE-2022-24921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
    },
    {
      "name": "CVE-2022-32208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
    },
    {
      "name": "CVE-2022-28327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
    },
    {
      "name": "CVE-2020-28851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851"
    },
    {
      "name": "CVE-2021-33196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
    },
    {
      "name": "CVE-2021-31525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
    },
    {
      "name": "CVE-2020-8285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
    },
    {
      "name": "CVE-2021-22901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
    },
    {
      "name": "CVE-2022-27778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
    },
    {
      "name": "CVE-2021-33198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
    },
    {
      "name": "CVE-2022-30635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
    },
    {
      "name": "CVE-2019-20838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
    },
    {
      "name": "CVE-2022-41715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
    },
    {
      "name": "CVE-2022-32207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
    },
    {
      "name": "CVE-2022-37603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
    },
    {
      "name": "CVE-2022-41722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
    },
    {
      "name": "CVE-2021-41182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41182"
    },
    {
      "name": "CVE-2023-40592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40592"
    },
    {
      "name": "CVE-2023-29403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
    },
    {
      "name": "CVE-2022-27776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
    },
    {
      "name": "CVE-2022-42916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
    },
    {
      "name": "CVE-2020-8286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
    },
    {
      "name": "CVE-2023-29405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
    },
    {
      "name": "CVE-2021-38297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
    },
    {
      "name": "CVE-2022-30629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2022-32149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
    },
    {
      "name": "CVE-2022-32148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
    },
    {
      "name": "CVE-2020-8177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
    },
    {
      "name": "CVE-2021-41771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
    },
    {
      "name": "CVE-2021-33197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
    },
    {
      "name": "CVE-2021-27918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
    },
    {
      "name": "CVE-2022-30630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
    },
    {
      "name": "CVE-2021-22924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
    },
    {
      "name": "CVE-2022-33987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
    },
    {
      "name": "CVE-2022-43552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
    },
    {
      "name": "CVE-2023-40596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40596"
    },
    {
      "name": "CVE-2023-40594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40594"
    },
    {
      "name": "CVE-2021-22947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
    },
    {
      "name": "CVE-2021-22922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
    },
    {
      "name": "CVE-2023-40595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40595"
    },
    {
      "name": "CVE-2022-22576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
    },
    {
      "name": "CVE-2021-38561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
    },
    {
      "name": "CVE-2021-39293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
    },
    {
      "name": "CVE-2022-1705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
    },
    {
      "name": "CVE-2022-3510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
    },
    {
      "name": "CVE-2022-3509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
    },
    {
      "name": "CVE-2021-22946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
    },
    {
      "name": "CVE-2020-8284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
    },
    {
      "name": "CVE-2023-23915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
    },
    {
      "name": "CVE-2022-41720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
    },
    {
      "name": "CVE-2022-41716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
    },
    {
      "name": "CVE-2022-24999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
    },
    {
      "name": "CVE-2022-29526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
    },
    {
      "name": "CVE-2022-30633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
    },
    {
      "name": "CVE-2022-1941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
    },
    {
      "name": "CVE-2021-3520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
    },
    {
      "name": "CVE-2022-36227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
    },
    {
      "name": "CVE-2021-41184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41184"
    },
    {
      "name": "CVE-2021-41183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41183"
    },
    {
      "name": "CVE-2021-36976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2022-27775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
    },
    {
      "name": "CVE-2023-23914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
    },
    {
      "name": "CVE-2022-30632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
    },
    {
      "name": "CVE-2022-27774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
    },
    {
      "name": "CVE-2022-37601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
    },
    {
      "name": "CVE-2022-1962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
    },
    {
      "name": "CVE-2021-23382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23382"
    },
    {
      "name": "CVE-2023-40597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40597"
    },
    {
      "name": "CVE-2022-2309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
    },
    {
      "name": "CVE-2022-42915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
    },
    {
      "name": "CVE-2022-32221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
    },
    {
      "name": "CVE-2022-28131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
    },
    {
      "name": "CVE-2022-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
    },
    {
      "name": "CVE-2021-22897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
    },
    {
      "name": "CVE-2022-24675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
    },
    {
      "name": "CVE-2022-23806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
    },
    {
      "name": "CVE-2021-36221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
    },
    {
      "name": "CVE-2022-2880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
    },
    {
      "name": "CVE-2022-23773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
    },
    {
      "name": "CVE-2023-24539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
    },
    {
      "name": "CVE-2018-10237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
    },
    {
      "name": "CVE-2021-34558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
    },
    {
      "name": "CVE-2021-3803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
    },
    {
      "name": "CVE-2022-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
    },
    {
      "name": "CVE-2022-32205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
    },
    {
      "name": "CVE-2023-27534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2022-23772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
    },
    {
      "name": "CVE-2020-29652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29652"
    },
    {
      "name": "CVE-2022-43551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
    },
    {
      "name": "CVE-2022-42004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
    },
    {
      "name": "CVE-2022-40023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40023"
    },
    {
      "name": "CVE-2021-22569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
    },
    {
      "name": "CVE-2023-27533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
    },
    {
      "name": "CVE-2021-41772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
    },
    {
      "name": "CVE-2020-8231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
    },
    {
      "name": "CVE-2022-27779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
    },
    {
      "name": "CVE-2023-29400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
    },
    {
      "name": "CVE-2022-25881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
    },
    {
      "name": "CVE-2021-31566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
    },
    {
      "name": "CVE-2021-29923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2020-8908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
    },
    {
      "name": "CVE-2022-30634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
    },
    {
      "name": "CVE-2021-44716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
    },
    {
      "name": "CVE-2021-23343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
    },
    {
      "name": "CVE-2022-35737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
    },
    {
      "name": "CVE-2021-33194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
    },
    {
      "name": "CVE-2023-24540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
    },
    {
      "name": "CVE-2022-32206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
    },
    {
      "name": "CVE-2022-38900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
    },
    {
      "name": "CVE-2023-40598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40598"
    },
    {
      "name": "CVE-2013-7489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
    },
    {
      "name": "CVE-2021-22926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
    },
    {
      "name": "CVE-2021-30560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
    },
    {
      "name": "CVE-2023-40593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40593"
    },
    {
      "name": "CVE-2022-30580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
    },
    {
      "name": "CVE-2018-20225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
    },
    {
      "name": "CVE-2021-22890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
    },
    {
      "name": "CVE-2022-42003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
    },
    {
      "name": "CVE-2021-44717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
    },
    {
      "name": "CVE-2020-14155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
    },
    {
      "name": "CVE-2022-29804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    },
    {
      "name": "CVE-2021-22923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
    },
    {
      "name": "CVE-2022-37599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
    },
    {
      "name": "CVE-2023-29402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
    },
    {
      "name": "CVE-2021-29060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
    },
    {
      "name": "CVE-2021-43565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
    },
    {
      "name": "CVE-2022-30115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
    },
    {
      "name": "CVE-2022-3171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
    },
    {
      "name": "CVE-2021-20066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20066"
    },
    {
      "name": "CVE-2021-22876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
    },
    {
      "name": "CVE-2023-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
    },
    {
      "name": "CVE-2022-23491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
    },
    {
      "name": "CVE-2022-27780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2021-22945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
    },
    {
      "name": "CVE-2021-33195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
    },
    {
      "name": "CVE-2022-27664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
    },
    {
      "name": "CVE-2023-23916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
    }
  ],
  "initial_release_date": "2023-08-31T00:00:00",
  "last_revision_date": "2023-08-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0701",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-08-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0802 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0802"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0804 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0804"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0806 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0806"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0810 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0810"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0807 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0807"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0808 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0808"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0803 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0803"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0801 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0801"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0805 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0805"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0809 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0809"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0811 du 30 ao\u00fbt 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0811"
    }
  ]
}

CERTFR-2023-AVI-0428
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk N/A Splunk Universal Forwarders versions 8.2.x antérieures à 8.2.11
Splunk Splunk Enterprise Splunk Enterprise versions antérieures à 8.1.14
Splunk N/A Splunk App for Lookup File Editing versions antérieures à 4.0.1
Splunk N/A Splunk App for Stream versions antérieures à 8.1.1
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.5
Splunk N/A Splunk Cloud versions antérieures à 9.0.2303.100
Splunk N/A Splunk Universal Forwarders versions 9.0.x antérieures à 9.0.5
Splunk N/A Splunk Universal Forwarders versions antérieures à 8.1.14
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.11

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Universal Forwarders versions 8.2.x ant\u00e9rieures \u00e0 8.2.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk App for Lookup File Editing versions ant\u00e9rieures \u00e0 4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk App for Stream versions ant\u00e9rieures \u00e0 8.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.0.2303.100",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarders versions 9.0.x ant\u00e9rieures \u00e0 9.0.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarders versions ant\u00e9rieures \u00e0 8.1.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.11",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
    },
    {
      "name": "CVE-2022-35252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
    },
    {
      "name": "CVE-2022-31129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
    },
    {
      "name": "CVE-2022-32189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
    },
    {
      "name": "CVE-2022-30631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
    },
    {
      "name": "CVE-2023-1370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
    },
    {
      "name": "CVE-2022-27191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
    },
    {
      "name": "CVE-2022-46175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
    },
    {
      "name": "CVE-2020-8169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
    },
    {
      "name": "CVE-2020-7753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7753"
    },
    {
      "name": "CVE-2022-27781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
    },
    {
      "name": "CVE-2021-22925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
    },
    {
      "name": "CVE-2020-8116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8116"
    },
    {
      "name": "CVE-2022-35260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2021-33502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33502"
    },
    {
      "name": "CVE-2022-24921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
    },
    {
      "name": "CVE-2022-32208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
    },
    {
      "name": "CVE-2022-28327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
    },
    {
      "name": "CVE-2020-8285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
    },
    {
      "name": "CVE-2021-22901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
    },
    {
      "name": "CVE-2022-27778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
    },
    {
      "name": "CVE-2022-30635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
    },
    {
      "name": "CVE-2021-33503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
    },
    {
      "name": "CVE-2022-41715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
    },
    {
      "name": "CVE-2023-32715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32715"
    },
    {
      "name": "CVE-2022-32207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
    },
    {
      "name": "CVE-2022-37603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2022-27776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
    },
    {
      "name": "CVE-2022-42916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
    },
    {
      "name": "CVE-2020-8286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
    },
    {
      "name": "CVE-2020-7774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
    },
    {
      "name": "CVE-2022-30629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2022-32148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
    },
    {
      "name": "CVE-2020-8177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
    },
    {
      "name": "CVE-2021-27292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27292"
    },
    {
      "name": "CVE-2022-30630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
    },
    {
      "name": "CVE-2021-22924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
    },
    {
      "name": "CVE-2022-33987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
    },
    {
      "name": "CVE-2022-43552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
    },
    {
      "name": "CVE-2023-32717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32717"
    },
    {
      "name": "CVE-2021-22947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
    },
    {
      "name": "CVE-2021-22922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
    },
    {
      "name": "CVE-2022-22576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
    },
    {
      "name": "CVE-2022-1705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
    },
    {
      "name": "CVE-2023-32708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32708"
    },
    {
      "name": "CVE-2021-22946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
    },
    {
      "name": "CVE-2020-8284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
    },
    {
      "name": "CVE-2023-23915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
    },
    {
      "name": "CVE-2022-41720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
    },
    {
      "name": "CVE-2022-41716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
    },
    {
      "name": "CVE-2022-24999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
    },
    {
      "name": "CVE-2022-29526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
    },
    {
      "name": "CVE-2022-30633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
    },
    {
      "name": "CVE-2021-33587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33587"
    },
    {
      "name": "CVE-2021-3520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
    },
    {
      "name": "CVE-2022-36227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
    },
    {
      "name": "CVE-2020-13822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13822"
    },
    {
      "name": "CVE-2021-36976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2022-27775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2023-23914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
    },
    {
      "name": "CVE-2022-30632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
    },
    {
      "name": "CVE-2022-27774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
    },
    {
      "name": "CVE-2022-37601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
    },
    {
      "name": "CVE-2021-20095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20095"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2019-10744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
    },
    {
      "name": "CVE-2022-1962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
    },
    {
      "name": "CVE-2021-23382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23382"
    },
    {
      "name": "CVE-2023-32716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32716"
    },
    {
      "name": "CVE-2022-42915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
    },
    {
      "name": "CVE-2022-32221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2022-28131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
    },
    {
      "name": "CVE-2022-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
    },
    {
      "name": "CVE-2021-22897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
    },
    {
      "name": "CVE-2023-32711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32711"
    },
    {
      "name": "CVE-2022-24675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
    },
    {
      "name": "CVE-2022-23806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
    },
    {
      "name": "CVE-2022-2880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
    },
    {
      "name": "CVE-2022-23773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
    },
    {
      "name": "CVE-2021-3803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
    },
    {
      "name": "CVE-2022-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
    },
    {
      "name": "CVE-2022-32205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
    },
    {
      "name": "CVE-2023-27534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2022-23772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
    },
    {
      "name": "CVE-2022-43551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
    },
    {
      "name": "CVE-2022-42004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
    },
    {
      "name": "CVE-2022-40023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40023"
    },
    {
      "name": "CVE-2023-27533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
    },
    {
      "name": "CVE-2022-43680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
    },
    {
      "name": "CVE-2020-8231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
    },
    {
      "name": "CVE-2022-27779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
    },
    {
      "name": "CVE-2021-31566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
    },
    {
      "name": "CVE-2023-32712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32712"
    },
    {
      "name": "CVE-2022-4200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4200"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2022-30634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
    },
    {
      "name": "CVE-2021-23343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
    },
    {
      "name": "CVE-2022-35737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
    },
    {
      "name": "CVE-2020-8203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
    },
    {
      "name": "CVE-2023-32710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32710"
    },
    {
      "name": "CVE-2022-32206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
    },
    {
      "name": "CVE-2019-20149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20149"
    },
    {
      "name": "CVE-2022-38900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
    },
    {
      "name": "CVE-2017-16042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-16042"
    },
    {
      "name": "CVE-2021-22926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
    },
    {
      "name": "CVE-2022-30580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
    },
    {
      "name": "CVE-2021-22890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
    },
    {
      "name": "CVE-2023-32706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32706"
    },
    {
      "name": "CVE-2019-10746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10746"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2022-29804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
    },
    {
      "name": "CVE-2020-15138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15138"
    },
    {
      "name": "CVE-2021-22923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
    },
    {
      "name": "CVE-2022-37599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
    },
    {
      "name": "CVE-2021-23368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23368"
    },
    {
      "name": "CVE-2021-29060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
    },
    {
      "name": "CVE-2021-43565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
    },
    {
      "name": "CVE-2023-32709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32709"
    },
    {
      "name": "CVE-2022-37616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37616"
    },
    {
      "name": "CVE-2022-30115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
    },
    {
      "name": "CVE-2021-22876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
    },
    {
      "name": "CVE-2020-7662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7662"
    },
    {
      "name": "CVE-2023-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
    },
    {
      "name": "CVE-2022-23491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
    },
    {
      "name": "CVE-2022-27780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2021-22945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
    },
    {
      "name": "CVE-2023-32707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32707"
    },
    {
      "name": "CVE-2022-27664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
    },
    {
      "name": "CVE-2023-32713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32713"
    },
    {
      "name": "CVE-2022-25858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
    },
    {
      "name": "CVE-2023-32714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32714"
    },
    {
      "name": "CVE-2019-8331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
    },
    {
      "name": "CVE-2023-23916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
    }
  ],
  "initial_release_date": "2023-06-02T00:00:00",
  "last_revision_date": "2023-06-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0428",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-06-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eSplunk\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0603 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0603"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0609 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0609"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0607 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0607"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0602 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0602"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0613 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0613"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0608 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0608"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0610 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0610"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0611 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0611"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0614 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0614"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0601 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0601"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0605 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0605"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0606 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0606"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0615 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0615"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0604 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0604"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0612 du 01 juin 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0612"
    }
  ]
}

CERTFR-2023-AVI-0142
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans Splunk. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 9.0.2209.3
Splunk N/A Splunk Add-on Builder versions antérieures à 4.1.2
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.10
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.4
Splunk N/A Splunk CloudConnect SDK versions antérieures à 3.1.3
Splunk Splunk Enterprise Splunk Enterprise versions 8.1.x antérieures à 8.1.13
References
Bulletin de sécurité Splunk SVD-2023-0209 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0201 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0202 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0213 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0207 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0212 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0206 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0210 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0211 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0204 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0205 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0215 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0208 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0203 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Splunk SVD-2023-0203 du 14 février 2023 - other
Bulletin de sécurité Splunk SVD-2023-0210 du 14 février 2023 - other
Bulletin de sécurité Splunk SVD-2023-0205 du 14 février 2023 - other
Bulletin de sécurité Splunk SVD-2023-0202 du 14 février 2023 - other
Bulletin de sécurité Splunk SVD-2023-0215 du 14 février 2023 - other

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 9.0.2209.3",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Add-on Builder versions ant\u00e9rieures \u00e0 4.1.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.4",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk CloudConnect SDK versions ant\u00e9rieures \u00e0 3.1.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-31129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
    },
    {
      "name": "CVE-2023-22940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22940"
    },
    {
      "name": "CVE-2023-22938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22938"
    },
    {
      "name": "CVE-2021-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
    },
    {
      "name": "CVE-2023-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22942"
    },
    {
      "name": "CVE-2021-3537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
    },
    {
      "name": "CVE-2021-28957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28957"
    },
    {
      "name": "CVE-2023-22936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22936"
    },
    {
      "name": "CVE-2023-22934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22934"
    },
    {
      "name": "CVE-2023-22937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22937"
    },
    {
      "name": "CVE-2022-32212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32212"
    },
    {
      "name": "CVE-2022-24785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
    },
    {
      "name": "CVE-2023-22933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22933"
    },
    {
      "name": "CVE-2023-22932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22932"
    },
    {
      "name": "CVE-2023-22935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22935"
    },
    {
      "name": "CVE-2021-21419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-21419"
    },
    {
      "name": "CVE-2023-22931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22931"
    },
    {
      "name": "CVE-2023-22943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22943"
    },
    {
      "name": "CVE-2023-22941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22941"
    },
    {
      "name": "CVE-2023-22939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22939"
    },
    {
      "name": "CVE-2015-20107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
    },
    {
      "name": "CVE-2021-3518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
    }
  ],
  "initial_release_date": "2023-02-17T00:00:00",
  "last_revision_date": "2023-02-17T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0203 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0203"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0210 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0210"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0205 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0205"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0202 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0202"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk\u00a0SVD-2023-0215 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0215"
    }
  ],
  "reference": "CERTFR-2023-AVI-0142",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-02-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSplunk\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une injection de code indirecte \u00e0 distance\n(XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0209 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0209"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0201 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0201"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0202 du 14 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0213 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0213"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0207 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0207"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0212 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0212"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0206 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0206"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0210 du 14 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0211 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0211"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0204 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0204"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0205 du 14 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0215 du 14 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0208 du 14 f\u00e9vrier 2023",
      "url": "https://advisory.splunk.com/advisories/SVD-2023-0208"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-0203 du 14 f\u00e9vrier 2023",
      "url": null
    }
  ]
}

CERTFR-2022-AVI-986
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 8.1.x antérieures à 8.1.12
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.9
Splunk Splunk Cloud Platform Splunk Cloud Platform versions 9.0.x antérieures à 9.0.2211
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 8.1.x ant\u00e9rieures \u00e0 8.1.12",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.9",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions 9.0.x ant\u00e9rieures \u00e0 9.0.2211",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.2",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-43566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43566"
    },
    {
      "name": "CVE-2022-43563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43563"
    },
    {
      "name": "CVE-2022-43571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43571"
    },
    {
      "name": "CVE-2022-43568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43568"
    },
    {
      "name": "CVE-2022-43569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43569"
    },
    {
      "name": "CVE-2022-43564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43564"
    },
    {
      "name": "CVE-2022-43561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43561"
    },
    {
      "name": "CVE-2022-43565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43565"
    },
    {
      "name": "CVE-2020-36518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
    },
    {
      "name": "CVE-2022-43572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43572"
    },
    {
      "name": "CVE-2022-43570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43570"
    },
    {
      "name": "CVE-2022-43567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43567"
    },
    {
      "name": "CVE-2022-43562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43562"
    }
  ],
  "initial_release_date": "2022-11-03T00:00:00",
  "last_revision_date": "2022-11-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-986",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-11-03T00:00:00.000000"
    },
    {
      "description": "Correction num\u00e9ro de CVE : CVE-2022-36518 remplac\u00e9 par CVE-2020-36518",
      "revision_date": "2022-11-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1102 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1102.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1106 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1106.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1104 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1104.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1101 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1101.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1113 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1113.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1112 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1112.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1109 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1109.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1111 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1111.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1103 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1103.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1105 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1105.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1110 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1110.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1107 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-1108 du 02 novembre 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-1108.html"
    }
  ]
}

CERTFR-2022-AVI-746
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Splunk. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 9.0.x antérieures à 9.0.1
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 9.0.2205
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.7.1
Splunk Splunk Enterprise Splunk Enterprise versions 8.1.x antérieures à 8.1.11
Splunk N/A Universal Forwarders versions 8.2.x antérieures à 8.2.7.1
Splunk N/A Universal Forwarders versions 9.0.x antérieures à 9.0.1
Splunk N/A Universal Forwarders versions 8.1.x antérieures à 8.1.11

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 9.0.2205",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.7.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.1.x ant\u00e9rieures \u00e0 8.1.11",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarders versions 8.2.x ant\u00e9rieures \u00e0 8.2.7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarders versions 9.0.x ant\u00e9rieures \u00e0 9.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Universal Forwarders versions 8.1.x ant\u00e9rieures \u00e0 8.1.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2022-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
    },
    {
      "name": "CVE-2022-37438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37438"
    },
    {
      "name": "CVE-2022-209824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-209824"
    },
    {
      "name": "CVE-2022-23308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
    },
    {
      "name": "CVE-2022-37439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37439"
    },
    {
      "name": "CVE-2022-37437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37437"
    },
    {
      "name": "CVE-2021-3541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
    },
    {
      "name": "CVE-2022-233089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-233089"
    }
  ],
  "initial_release_date": "2022-08-17T00:00:00",
  "last_revision_date": "2022-08-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-746",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0801 du 16 ao\u00fbt 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0804 du 16 ao\u00fbt 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0804.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0803 du 16 ao\u00fbt 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0803.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0802 du 16 ao\u00fbt 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0802.html"
    }
  ]
}

CERTFR-2022-AVI-548
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Universal Forwarder Universal Forwarder versions antérieures à 9.0
Splunk Splunk Enterprise Splunk Enterprise versions antérieures à 9.0
Splunk Splunk Cloud Platform Splunk Cloud Platform versions antérieures à 8.2.2203

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Universal Forwarder versions ant\u00e9rieures \u00e0 9.0",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions ant\u00e9rieures \u00e0 9.0",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Cloud Platform versions ant\u00e9rieures \u00e0 8.2.2203",
      "product": {
        "name": "Splunk Cloud Platform",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-32152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32152"
    },
    {
      "name": "CVE-2022-32151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32151"
    },
    {
      "name": "CVE-2022-32155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32155"
    },
    {
      "name": "CVE-2022-32156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32156"
    },
    {
      "name": "CVE-2022-32154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32154"
    },
    {
      "name": "CVE-2022-32153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32153"
    },
    {
      "name": "CVE-2022-32158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32158"
    },
    {
      "name": "CVE-2022-32157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32157"
    }
  ],
  "initial_release_date": "2022-06-15T00:00:00",
  "last_revision_date": "2022-06-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-548",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-06-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSplunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0604 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0603 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0603.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0605 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0605.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0601 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0601.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0602 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0602.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0607 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0607.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0608 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0608.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0606 du 14 juin 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0606.html"
    }
  ]
}

CERTFR-2022-AVI-418
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Splunk Enterprise. Certaines d'entre elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 8.2.x antérieures à 8.2.1
Splunk Splunk Enterprise Splunk Enterprise versions 8.1.x antérieures à 8.1.7

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 8.2.x ant\u00e9rieures \u00e0 8.2.1",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.1.x ant\u00e9rieures \u00e0 8.1.7",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-42743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42743"
    },
    {
      "name": "CVE-2021-31559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31559"
    },
    {
      "name": "CVE-2022-27183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27183"
    },
    {
      "name": "CVE-2021-33845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33845"
    },
    {
      "name": "CVE-2021-26253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26253"
    },
    {
      "name": "CVE-2022-26889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26889"
    },
    {
      "name": "CVE-2022-26070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26070"
    }
  ],
  "initial_release_date": "2022-05-05T00:00:00",
  "last_revision_date": "2022-05-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-418",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-05-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk Enterprise.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\ncontournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk Enterprise",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0507 du 03 mai 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0507.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0503 du 03 mai 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0503.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0506 du 03 mai 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0506.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0504 du 03 mai 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0504.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0502 du 03 mai 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0502.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0501 du 03 mai 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0505 du 03 mai 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0505.html"
    }
  ]
}

CERTFR-2022-AVI-289
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Splunk. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Splunk Splunk Enterprise Splunk Enterprise versions 8.1.x antérieures à 8.1.3
Splunk Splunk Enterprise Splunk Enterprise versions 8.0.x antérieures à 8.0.9
Splunk Splunk Enterprise Splunk Enterprise versions 7.3.x antérieures à 7.3.9
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise versions 8.1.x ant\u00e9rieures \u00e0 8.1.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 8.0.x ant\u00e9rieures \u00e0 8.0.9",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 7.3.x ant\u00e9rieures \u00e0 7.3.9",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-3422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3422"
    }
  ],
  "initial_release_date": "2022-03-30T00:00:00",
  "last_revision_date": "2022-03-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-289",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-03-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Splunk. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Splunk",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk svd-2022-0301 du 24 mars 2022",
      "url": "https://www.splunk.com/en_us/product-security/announcements/svd-2022-0301.html"
    }
  ]
}