CVE Vulnerabilities

CVE-2023-32709

Published: Jun 01, 2023 | Modified: Apr 10, 2024
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the ‘user’ role can see the hashed version of the initial user name and password for the Splunk instance by using the ‘rest’ SPL command against the ‘conf-user-seed’ REST endpoint.

Affected Software

Name Vendor Start Version End Version
Splunk Splunk 8.1.0 (including) 8.1.14 (excluding)
Splunk Splunk 8.2.0 (including) 8.2.11 (excluding)
Splunk Splunk 9.0.0 (including) 9.0.5 (excluding)
Splunk_cloud_platform Splunk * 9.0.2303.100 (excluding)

References