

#Splunk certs upgrade#
We understand that not all of our customers will be able to upgrade to the latest release immediately. To remediate all the vulnerabilities listed in the advisories, we recommend customers upgrade to 9.0.

SVD-2022-0604 - Risky commands warnings in Splunk Enterprise dashboards.SVD-2022-0603 - Splunk Enterprise lacked TLS hostname certificate validation.SVD-2022-0602 - Splunk Enterprise lacked TLS certificate validation for Splunk-to-Splunk communication by default.SVD-2022-0601 - Splunk Enterprise disabled TLS validation using the CA certificate stores in Python 3 libraries by default.The advisories and their links are listed below: We’re committed to reporting new vulnerabilities consistent with our Security Advisory Policy and expediting maintenance releases for supported versions to address critical-risk, high-impact vulnerabilities outlined in our security program here.ĭifferent advisories may be applicable to your Splunk environment depending on the Splunk deployment type you are using, such as Splunk Cloud Platform (across regions, cloud providers, and compliance environments) and Customer Managed Platform (CMP).

We’ve received customer feedback about the vulnerabilities and our process, following the release of the advisories, which we appreciate and are addressing as part of our commitment to continuously improving Splunk's security posture. On JSplunk published eight Security Advisories regarding vulnerabilities related to Splunk Enterprise and Splunk Cloud Platform. Customer security and trust are our top priorities.
