Splunk Updates
2973Warning Date
Severity Level
Warning Number
Target Sector
14 December, 2021
● Critical
2021-4049
All
Description:
Splunk has released security updates to address a vulnerability in the following products:
- Add-On: Java Management Extensions
- 5.2.0 and previous
- Add-On: JBoss
- 3.0.0, 2.1.0
- Add-On: Tomcat
- 3.0.0, 2.1.0
- Data Stream Processor
- DSP 1.0.x, DSP 1.1.x, DSP 1.2.x
- IT Essentials Work
- 4.11, 4.10.x (Cloud only), 4.9.x
- IT Service Intelligence (ITSI)
- 4.11.0, 4.10.x (Cloud only), 4.9.x, 4.8.x (Cloud only), 4.7.x, 4.6.x, 4.5.x
- Splunk Connect for Kafka
- 2.0.3
- Splunk Enterprise (including instance types like Heavy Forwarders)
- All supported non-Windows versions of 8.1.x and 8.2.x only if DFS is used. See Removing Log4j from Splunk Enterprise below for guidance on unsupported versions.
- Splunk Enterprise Amazon Machine Image (AMI)
- See Splunk Enterprise
- Splunk Enterprise Docker Container
- See Splunk Enterprise
- Splunk Logging Library for Java
- 1.11.0
- Stream Processor Service
Threats:
A remote attacker could exploit this vulnerability by executing arbitrary code.
Best practice and Recommendations:
The CERT team encourages users to review Splunk security advisory and apply the necessary updates: