Password exposure via Splunk Enterprise AdminManager Debug Log (pre-9.3.1)
CVE-2024-45739 Published on October 14, 2024
Sensitive information disclosure in AdminManager logging channel
In Splunk Enterprise versions below 9.3.1, 9.2.3, and 9.1.6, the software potentially exposes plaintext passwords for local native authentication Splunk users. This exposure could happen when you configure the Splunk Enterprise AdminManager log channel at the DEBUG logging level.
Weakness Type
What is an Information Disclosure Vulnerability?
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CVE-2024-45739 has been classified to as an Information Disclosure vulnerability or weakness.
Products Associated with CVE-2024-45739
Want to know whenever a new CVE is published for Splunk? stack.watch will email you.
Affected Versions
Splunk Enterprise:- Version 9.3 and below 9.3.1 is affected.
- Version 9.2 and below 9.2.3 is affected.
- Version 9.1 and below 9.1.6 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.