- Description
- In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
- Source
- prodsec@splunk.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 4.9
- Impact score
- 3.6
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FB935ACC-3899-47DE-B4C0-CB94CAC79AC2",
"versionEndExcluding": "9.1.6",
"versionStartIncluding": "9.1.0"
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1",
"versionEndExcluding": "9.2.3",
"versionStartIncluding": "9.2.0"
},
{
"criteria": "cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ABC6D150-A6A1-4319-9084-B9C683D11200"
}
],
"operator": "OR"
}
]
}
]