Potential Exposure of Plaintext Passwords in Splunk Enterprise
CVE-2024-45739
4.9MEDIUM
Summary
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
Affected Version(s)
Splunk Enterprise 9.3 < 9.3.1
Splunk Enterprise 9.2 < 9.2.3
Splunk Enterprise 9.1 < 9.1.6
References
CVSS V3.1
Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Credit
Eric McGinnis, Splunk
Rod Soto, Splunk