Splunk

Splunk

184 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 11.03.2026 16:18:22
  • Zuletzt bearbeitet 23.03.2026 14:20:36

In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.9, and Splunk Cloud Platform versions below 10.2.2510.4, 10.1.2507.15, 10.0.2503.11, and 9.3.2411.123, a low-privileged user who does not hold the "admin" or "power" Splunk roles coul...

  • EPSS 0.03%
  • Veröffentlicht 11.03.2026 16:18:17
  • Zuletzt bearbeitet 12.03.2026 21:08:22

In Splunk Enterprise versions below 10.2.1 and 10.0.4, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, and 10.0.2503.12, a low-privileged user that does not hold the "admin" or "power" Splunk roles could retrieve the Observability...

  • EPSS 0.06%
  • Veröffentlicht 18.02.2026 16:45:37
  • Zuletzt bearbeitet 23.02.2026 14:44:34

In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the RSA `accessKey` value from the [<u>Authe...

  • EPSS 0.06%
  • Veröffentlicht 18.02.2026 16:45:33
  • Zuletzt bearbeitet 20.02.2026 13:50:05

In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the `integrationKey`, `secretKey`, and `app...

  • EPSS 0.06%
  • Veröffentlicht 18.02.2026 16:45:32
  • Zuletzt bearbeitet 20.02.2026 13:47:44

In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.8, 9.3.9, and 9.2.12, and Splunk Cloud Platform versions below 10.2.2510.3, 10.1.2507.8, 10.0.2503.9, and 9.3.2411.121, a low-privileged user that does not hold the "admin" or "power" Splunk rol...

  • EPSS 0.06%
  • Veröffentlicht 18.02.2026 16:45:23
  • Zuletzt bearbeitet 23.02.2026 14:43:22

In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.8, and 9.2.11, and Splunk Cloud Platform versions below 10.2.2510.0, 10.1.2507.11, 10.0.2503.9, and 9.3.2411.120, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role ...

  • EPSS 0.04%
  • Veröffentlicht 18.02.2026 16:45:21
  • Zuletzt bearbeitet 23.02.2026 14:46:16

In Splunk Enterprise versions below 10.0.2, 10.0.3, 9.4.8, and 9.3.9, a low-privileged user who does not hold the "admin" Splunk role could access the Splunk Monitoring Console App endpoints due to an improper access control. This could lead to a sen...

  • EPSS 0.04%
  • Veröffentlicht 18.02.2026 16:45:17
  • Zuletzt bearbeitet 20.02.2026 13:53:39

In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the "admin" or "power" Splunk role...

  • EPSS 0.04%
  • Veröffentlicht 03.12.2025 17:00:59
  • Zuletzt bearbeitet 05.12.2025 17:11:26

In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability `change_authentication` cou...

Medienbericht
  • EPSS 0.07%
  • Veröffentlicht 03.12.2025 17:00:55
  • Zuletzt bearbeitet 05.12.2025 17:05:57

In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and versions below 3.9.10, 3.8.58 and 3.7.28 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the "admin" or "power" Splunk roles...