{"uuid": "ca63cca2-db34-4d91-a3b2-800656f7f19b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43567", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14998", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43567\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app.\n\n\ud83d\udccf Published: 2022-11-04T22:21:50.819Z\n\ud83d\udccf Modified: 2025-05-05T20:34:05.121Z\n\ud83d\udd17 References:\n1. https://www.splunk.com/en_us/product-security/announcements/svd-2022-1107.html\n2. https://research.splunk.com/application/baa41f09-df48-4375-8991-520beea161be/", "creation_timestamp": "2025-05-05T21:20:15.000000Z"}