- Description
- In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) through a file upload to the "$SPLUNK_HOME/var/run/splunk/apptemp" directory due to missing authorization checks.
- Source
- psirt@cisco.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 8
- Impact score
- 5.9
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- psirt@cisco.com
- CWE-284
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
هر چه سریعتر Splunk رو update کنید. به تازگی برای سرویس دفاعی Splunk، آسیب پذیری با کد شناسایی CVE-2025-20229 و از نوع file upload منتشر شده است که به هکرها در نهایت امکان اجرای RCE را می دهد. https://t.co/Poz3aKY03t https://t.co/c7OBz4UtNW
@AmirHossein_sec
4 Apr 2025
25 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-20229 🔴 HIGH (8) 🏢 Splunk - Splunk Enterprise 🏗️ 9.4 🔗 https://t.co/Kh0zjZswAE #CyberCron #VulnAlert #InfoSec https://t.co/5oqqDgRdiS
@cybercronai
28 Mar 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical vulnerabilities in Splunk Enterprise and Cloud have been patched, addressing RCE and data leak risks (CVE-2025-20229, CVE-2025-20231). Organizations advised to check user access controls. 🛡️🔒 #Splunk #DataSecurity #USA link: https://t.co/eV3lC4exvt https://t.co/D7YyKk
@TweetThreatNews
27 Mar 2025
106 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
Splunk has patched several vulnerabilities, including a high-severity remote code execution flaw (CVE-2025-20229) in Splunk Enterprise. Update ASAP to enhance security! ⚠️🔒 #SplunkUpdates #DataProtection #USA link: https://t.co/a7WJA2Wa0H https://t.co/OMXbnc9aJc
@TweetThreatNews
27 Mar 2025
75 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#Splunk a publié des correctifs pour plusieurs vulnérabilités. Parmi celles-ci, la CVE-2025-20229 permet à un utilisateur authentifié d'exécuter un code arbitraire en téléchargeant un fichier dans un dossier spécifique. https://t.co/0OOtPLysIy
@cert_ist
27 Mar 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20229 and CVE-2025-20231 impacts Splunk #Splunk #CVE-2025-20229 #CVE-2025-20231 https://t.co/4GQfmAvjLE
@pravin_karthik
27 Mar 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Splunkは、2件の高深刻度脆弱性(CVE-2025-20229およびCVE-2025-20231)に対するセキュリティアップデートを公開した。 CVE-2025-20229は、Splunk EnterpriseおよびSplunk Cloud Platformに影響するリモートコード実行脆弱性。
@yousukezan
27 Mar 2025
3004 Impressions
4 Retweets
18 Likes
5 Bookmarks
0 Replies
2 Quotes
Splunk Alert: RCE (CVE-2025-20229) and Data Leak (CVE-2025-20231) Vulnerabilities Threaten Platforms Splunk has released a security advisory detailing critical vulnerabilities affecting Splunk Enterprise and Splunk Cloud Platform. https://t.co/dnN9gD5QmW
@the_yellow_fall
27 Mar 2025
734 Impressions
4 Retweets
13 Likes
3 Bookmarks
0 Replies
0 Quotes
�� CVE-2025-20229 - Splunk Enterprise and Splunk Cloud Platform - HIGH 🚨 🗓️ Date published 2025-03-26 22:15:14 UTC #SplunkEnterpriseandSplunkCloudPlatform #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/ciEQBoB56O
@vulns_space
26 Mar 2025
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes