CVE-2023-32709
01.06.2023, 17:15
In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the user role can see the hashed version of the initial user name and password for the Splunk instance by using the rest SPL command against the conf-user-seed REST endpoint.Enginsight
Vendor | Product | Version |
---|---|---|
splunk | splunk | 8.1.0 ≤ 𝑥 < 8.1.14 |
splunk | splunk | 8.2.0 ≤ 𝑥 < 8.2.11 |
splunk | splunk | 9.0.0 ≤ 𝑥 < 9.0.5 |
splunk | splunk_cloud_platform | 𝑥 < 9.0.2303.100 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration