CVE-2021-42743

8.8 HIGH

📋 TL;DR

This vulnerability allows a local Windows user with lower privileges to escalate to the Splunk user account through a path misconfiguration. It affects Splunk Enterprise versions before 8.1.1 running on Windows systems.

💻 Affected Systems

Products:
  • Splunk Enterprise
Versions: All versions before 8.1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Linux and other platforms are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control over Splunk Enterprise as the Splunk user, potentially accessing sensitive data, modifying configurations, or using Splunk's privileges for further system compromise.

🟠

Likely Case

Local users exploit the misconfiguration to gain Splunk user privileges, enabling unauthorized access to Splunk data and functionality.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained, limiting damage to Splunk-specific resources.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing user access on the Windows system.
🏢 Internal Only: HIGH - Any local Windows user on affected systems can potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the Windows system but is relatively straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1.1 and later

Vendor Advisory: https://www.splunk.com/en_us/product-security/announcements/svd-2022-0501.html

Restart Required: Yes

Instructions:

1. Download Splunk Enterprise version 8.1.1 or later from Splunk's website. 2. Backup your current Splunk configuration and data. 3. Run the installer to upgrade to the patched version. 4. Restart Splunk services.

🔧 Temporary Workarounds

Restrict Local User Access

windows

Limit local user accounts on Windows systems running Splunk Enterprise to trusted administrators only.

Monitor Splunk User Activity

all

Implement enhanced monitoring and alerting for any activity by the Splunk user account.

🧯 If You Can't Patch

  • Isolate affected Windows systems from general user access
  • Implement strict access controls and monitoring for the Splunk user account

🔍 How to Verify

Check if Vulnerable:

Check Splunk version on Windows systems: If version is below 8.1.1, the system is vulnerable.

Check Version:

splunk version

Verify Fix Applied:

Verify Splunk version is 8.1.1 or higher and that the path misconfiguration has been corrected.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Splunk user account activity from non-administrative users
  • Failed or successful privilege change attempts

Network Indicators:

  • None - this is a local exploit

SIEM Query:

source="Windows Security" EventCode=4672 OR EventCode=4688 | search "Splunk" OR privilege_escalation

🔗 References

📤 Share & Export