CVE-2022-43572Uncontrolled Resource Consumption in Enterprise

Severity
6.5MEDIUMNVD
CNA7.5
EPSS
0.8%
top 25.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4
Latest updateNov 5

Description

In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5splunk/splunk_enterprise8.18.1.12+2
NVDsplunk/splunk8.1.08.1.12+2

🔴Vulnerability Details

2
GHSA
GHSA-9x3h-hpx6-h3hp: In Splunk Enterprise versions below 82022-11-05
CVEList
Indexing blockage via malformed data sent through S2S or HEC protocols in Splunk Enterprise2022-11-04
CVE-2022-43572 — Uncontrolled Resource Consumption | cvebase