iTnews Asia
  • Home
  • News
  • Security

Critical Splunk bug propagates code execution

Critical Splunk bug propagates code execution

Patch now, because all endpoints are vulnerable.

By Richard Chirgwin on Jun 27, 2022 11:48AM

Splunk is warning of a critical vulnerability which endangers any endpoint subscribed to a Splunk deployment server.

As the company explains here, Universal Forwarders are modules that collect client data in remote sources and forward the data to Splunk, and the deployment server pushes configuration data to the forwarders.

The bug has a critical on the Common Vulnerability Scoring System (a score of 9.0 in this case) because if an attacker compromises one Universal Forwarded (UF) endpoint in a Splunk deployment, they can push arbitrary code that will execute on all other UF endpoints subscribed to that deployment server.

In an enterprise deployment, that could amount to a compromise of thousands of endpoints.

America’s Centre for Internet Safety provides a technical explanation of CVE-2022-32158 here.

The vulnerability, CI Security explained, can deploy forwarder bundles to other clients through the deployment server.

“When a deployment server is used, it allows the creation of configuration bundles that can be automatically downloaded by Splunk Universal Forwarder (SUF) agents or other Splunk Enterprise instances such as heavy forwarders,” it said.

As well as plain text configuration files, the configuration bundles can include binary packages, “most commonly used for specific connectors”.

When fetched by the SUF, it will execute the binary, and by default, most SUF agents run with Windows SYSTEM privilege, the CI Security post explains.

Splunk has patched version 9.0 of its Enterprise deployment servers, but has not yet patched versions prior to 9.0. Rather, it recommends users of older versions upgrade to 9.0.

Only the deployment server needs the patch. The Splunk Cloud Platform doesn’t use deployment servers, and patching the SUFs doesn’t fix this bug. 

As this user explained on Splunk’s forums, deployment servers are only needed for pushing software out to SUFs - if the server isn’t currently in use, stopping it will block the vulnerability.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
cve cve202232158 cyber security deployment server security software splunk universal forwarder vulnerability

Related Articles

  • Malicious AI inputs are creating a new and critical security threat
  • AI governance must evolve alongside adoption in APAC
  • 2026 a pivotal year for enterprises to deliver real value from AI
  • AI is triggering a structural reset in enterprise IT strategy
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Malicious AI inputs are creating a new and critical security threat

Malicious AI inputs are creating a new and critical security threat

Singapore issues advisory for FIs to mitigate quantum computing risks

Singapore issues advisory for FIs to mitigate quantum computing risks

PhilHealth estimates 13 to 20 million members affected by data breach

PhilHealth estimates 13 to 20 million members affected by data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.