Your review has been sent successfully

Splunk Updates

2973
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

14 December, 2021

● Critical

2021-4049

All

Description:

Splunk has released security updates to address a vulnerability in the following products:

  • Add-On: Java Management Extensions
    • 5.2.0 and previous
  • Add-On: JBoss
    • 3.0.0, 2.1.0
  • Add-On: Tomcat
    • 3.0.0, 2.1.0
  • Data Stream Processor
    • DSP 1.0.x, DSP 1.1.x, DSP 1.2.x
  • IT Essentials Work
    • 4.11, 4.10.x (Cloud only), 4.9.x
  • IT Service Intelligence (ITSI)
    • 4.11.0, 4.10.x (Cloud only), 4.9.x, 4.8.x (Cloud only), 4.7.x, 4.6.x, 4.5.x
  • Splunk Connect for Kafka
    • 2.0.3
  • Splunk Enterprise (including instance types like Heavy Forwarders)
    • All supported non-Windows versions of 8.1.x and 8.2.x only if DFS is used. See Removing Log4j from Splunk Enterprise below for guidance on unsupported versions.
  • Splunk Enterprise Amazon Machine Image (AMI)
    • See Splunk Enterprise
  • Splunk Enterprise Docker Container
    • See Splunk Enterprise
  • Splunk Logging Library for Java
    • 1.11.0
  • Stream Processor Service

Threats:

A remote attacker could exploit this vulnerability by executing arbitrary code.

Best practice and Recommendations:

The CERT team encourages users to review Splunk security advisory and apply the necessary updates:

Last updated at 14 December, 2021

Rate the content

rate-icon
up icon