CVE-2022-32151 — Improper Certificate Validation in INC Splunk Cloud Platform
Severity
9.1CRITICALNVD
CNA7.4
EPSS
0.2%
top 57.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 15
Latest updateJun 16
Description
The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203. Python 3 client libraries now verify server certificates by default and use the appropriate CA certificate stores for each library. Apps and add-ons that include their own HTTP libraries are not affected. For Splunk Enterprise,…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2
Affected Packages4 packages
🔴Vulnerability Details
2GHSA▶
GHSA-4mv8-3862-hghv: The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA)↗2022-06-16
CVEList▶
Splunk Enterprise disabled TLS validation using the CA certificate stores in Python 3 libraries by default↗2022-06-15