CVE-2022-43572
04.11.2022, 23:15
In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.
Vendor | Product | Version |
---|---|---|
splunk | splunk | 8.1.0 ≤ 𝑥 < 8.1.12 |
splunk | splunk | 8.2.0 ≤ 𝑥 < 8.2.9 |
splunk | splunk | 9.0.0 ≤ 𝑥 < 9.0.2 |
splunk | splunk_cloud_platform | 𝑥 < 9.0.2209 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-400 - Uncontrolled Resource ConsumptionThe software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
- CWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.