Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-46562 | In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will. |
Mon, 05 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-05-05T20:34:58.924Z
Reserved: 2022-10-20T18:37:09.182Z
Link: CVE-2022-43566
Updated: 2024-08-03T13:32:59.752Z
Status : Modified
Published: 2022-11-04T23:15:10.080
Modified: 2024-11-21T07:26:47.917
Link: CVE-2022-43566
No data.
OpenCVE Enrichment
No data.
EUVD