iTnews Asia
  • Home
  • News
  • Security

Critical Splunk bug propagates code execution

Critical Splunk bug propagates code execution

Patch now, because all endpoints are vulnerable.

By Richard Chirgwin on Jun 27, 2022 11:48AM

Splunk is warning of a critical vulnerability which endangers any endpoint subscribed to a Splunk deployment server.

As the company explains here, Universal Forwarders are modules that collect client data in remote sources and forward the data to Splunk, and the deployment server pushes configuration data to the forwarders.

The bug has a critical on the Common Vulnerability Scoring System (a score of 9.0 in this case) because if an attacker compromises one Universal Forwarded (UF) endpoint in a Splunk deployment, they can push arbitrary code that will execute on all other UF endpoints subscribed to that deployment server.

In an enterprise deployment, that could amount to a compromise of thousands of endpoints.

America’s Centre for Internet Safety provides a technical explanation of CVE-2022-32158 here.

The vulnerability, CI Security explained, can deploy forwarder bundles to other clients through the deployment server.

“When a deployment server is used, it allows the creation of configuration bundles that can be automatically downloaded by Splunk Universal Forwarder (SUF) agents or other Splunk Enterprise instances such as heavy forwarders,” it said.

As well as plain text configuration files, the configuration bundles can include binary packages, “most commonly used for specific connectors”.

When fetched by the SUF, it will execute the binary, and by default, most SUF agents run with Windows SYSTEM privilege, the CI Security post explains.

Splunk has patched version 9.0 of its Enterprise deployment servers, but has not yet patched versions prior to 9.0. Rather, it recommends users of older versions upgrade to 9.0.

Only the deployment server needs the patch. The Splunk Cloud Platform doesn’t use deployment servers, and patching the SUFs doesn’t fix this bug. 

As this user explained on Splunk’s forums, deployment servers are only needed for pushing software out to SUFs - if the server isn’t currently in use, stopping it will block the vulnerability.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
cve cve202232158 cyber security deployment server security software splunk universal forwarder vulnerability

Related Articles

  • Why is fragmentation the next big cybersecurity risk?
  • The maritime sector is now in the crosshairs of cybercriminals
  • Thai Airways launches digital loyalty transformation
  • Tips on how to harness AI to transform your DDoS protection into proactive cyber defence
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The maritime sector is now in the crosshairs of cybercriminals

The maritime sector is now in the crosshairs of cybercriminals

Why is fragmentation the next big cybersecurity risk?

Why is fragmentation the next big cybersecurity risk?

Tips on how to harness AI to transform your DDoS protection into proactive cyber defence

Tips on how to harness AI to transform your DDoS protection into proactive cyber defence

Indonesia's national data centre suffers ransomware attack

Indonesia's national data centre suffers ransomware attack

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.