CVE-2023-32706

7.7 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to send specially-crafted XML messages to Splunk's SAML authentication parser, causing a denial of service that crashes the Splunk daemon. It affects Splunk Enterprise deployments with SAML authentication enabled on vulnerable versions. Organizations running affected Splunk versions with internet-facing interfaces are particularly at risk.

💻 Affected Systems

Products:
  • Splunk Enterprise
Versions: Below 9.0.5, 8.2.11, and 8.1.14
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SAML authentication is configured and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of Splunk Enterprise, disrupting log collection, monitoring, and security operations until manual restart.

🟠

Likely Case

Intermittent service disruptions affecting Splunk search capabilities, dashboard access, and data ingestion.

🟢

If Mitigated

Minimal impact if patched or if SAML authentication is disabled and proper network segmentation is in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires sending crafted XML to SAML endpoint; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.5, 8.2.11, or 8.1.14

Vendor Advisory: https://advisory.splunk.com/advisories/SVD-2023-0601

Restart Required: Yes

Instructions:

1. Download appropriate patched version from Splunk website. 2. Backup configuration and data. 3. Install update following Splunk upgrade procedures. 4. Restart Splunk services.

🔧 Temporary Workarounds

Disable SAML Authentication

all

Temporarily disable SAML authentication if not required, using alternative authentication methods.

Edit authentication.conf to disable SAML settings
Restart Splunk services

Network Access Control

all

Restrict access to Splunk SAML endpoints to trusted networks only.

Configure firewall rules to block external access to Splunk SAML ports (typically 8000, 8089)

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to Splunk SAML endpoints
  • Deploy WAF or IPS with XML parsing protection rules

🔍 How to Verify

Check if Vulnerable:

Check Splunk version via web interface or CLI; verify if SAML is enabled in authentication.conf.

Check Version:

splunk version

Verify Fix Applied:

Confirm version is 9.0.5+, 8.2.11+, or 8.1.14+ and test SAML authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Splunk daemon crash logs
  • Unusual XML parsing errors in splunkd.log
  • Failed SAML authentication attempts from unexpected sources

Network Indicators:

  • Unusual XML payloads to SAML endpoints
  • High volume of requests to /saml endpoints

SIEM Query:

source="*splunkd.log" ("XML parsing error" OR "daemon crash" OR "SAML")

🔗 References

📤 Share & Export