CVE-2024-45739
Severity CVSS v4.0:
Pending analysis
Type:
CWE-532
Information Exposure Through Log Files
Publication date:
14/10/2024
Last modified:
17/10/2024
Description
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
Impact
Base Score 3.x
4.90
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* | 9.1.0 (including) | 9.1.6 (excluding) |
| cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* | 9.2.0 (including) | 9.2.3 (excluding) |
| cpe:2.3:a:splunk:splunk:9.3.1:*:*:*:enterprise:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



