CVE-2022-37437

When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Destination through Splunk Web and only applies to environments that have configured TLS certificate validation. It does not apply to Destinations configured directly in the outputs.conf configuration file. The vulnerability affects Splunk Enterprise version 9.0.0 and does not affect versions below 9.0.0, including the 8.1.x and 8.2.x versions.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:splunk:splunk:9.0.0:*:*:*:enterprise:*:*:*

History

18 Aug 2022, 19:01

Type Values Removed Values Added
CPE cpe:2.3:a:splunk:splunk:9.0.0:*:*:*:enterprise:*:*:*
CWE CWE-295
First Time Splunk
Splunk splunk
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (CONFIRM) https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html - (CONFIRM) https://www.splunk.com/en_us/product-security/announcements/svd-2022-0801.html - Mitigation, Vendor Advisory

16 Aug 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-16 21:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-37437

Mitre link : CVE-2022-37437

CVE.ORG link : CVE-2022-37437


JSON object : View

Products Affected

splunk

  • splunk
CWE
CWE-295

Improper Certificate Validation