
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-32153 is a security vulnerability in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203, discovered and disclosed on June 14, 2022. The vulnerability relates to the lack of TLS certificate host name validation in communications between Splunk nodes and trusted hosts (Splunk SVD).
The vulnerability is classified with a CVSSv3.1 Score of 8.1 (High) and vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. It is categorized as CWE-297 and identified internally as SPL-202894. The issue specifically involves the absence of Transport Layer Security (TLS) certificate host name validation when Splunk platform instances make secure connections (Splunk SVD).
The vulnerability could potentially allow an attacker to perform a machine-in-the-middle attack if they manage to compromise a valid certificate within the certificate authority (CA) chain for the specific customer environment or a trusted machine's chain. However, Splunk peer communications configured properly with valid certificates were not vulnerable (NVD).
For Splunk Enterprise users, the recommended mitigation is to upgrade to version 9.0 or higher and configure TLS host name validation. For Splunk Cloud Platform customers, Splunk actively patches and monitors Cloud instances. Organizations are strongly advised to secure their Splunk environment with hardened TLS configurations (Splunk SVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."