Vulnerability Description
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Splunk | Splunk | >= 8.2.0, < 8.2.12 |
| Splunk | Splunk Cloud Platform | <= 9.0.2305.100 |
Related Weaknesses (CWE)
References
- https://advisory.splunk.com/advisories/SVD-2023-0803Vendor Advisory
- https://research.splunk.com/application/78b48d08-075c-4eac-bd07-e364c3780867/Vendor Advisory
- https://advisory.splunk.com/advisories/SVD-2023-0803Vendor Advisory
- https://research.splunk.com/application/78b48d08-075c-4eac-bd07-e364c3780867/Vendor Advisory
FAQ
What is CVE-2023-40594?
CVE-2023-40594 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance.
How severe is CVE-2023-40594?
CVE-2023-40594 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-40594?
Check the references section above for vendor advisories and patch information. Affected products include: Splunk Splunk, Splunk Splunk Cloud Platform.