Splunk Enterprise 6.2.x < 6.2.2 Multiple Vulnerabilities (FREAK)

medium Nessus Plugin ID 81812

Synopsis

The remote web server contains an application that is affected by multiple vulnerabilities.

Description

According to its version number, the Splunk Enterprise hosted on the remote web server is version 6.2.x prior to 6.2.2. It is, therefore, affected by the following vulnerabilities :

- A flaw exists with ECDH handshakes when using an ECDSA certificate without a ServerKeyExchange message. This allows a remote attacker to trigger a loss of forward secrecy from the ciphersuite. (CVE-2014-3572)

- A security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), exists due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic. (CVE-2015-0204)

- A denial of service vulnerability exists in Splunk Web that allows a remote attacker, using a specially crafted request, to trigger an assert and thus crash the Splunk Enterprise instance. (SPL-93754)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Splunk Enterprise 6.2.2 or later.

See Also

https://www.splunk.com/view/SP-CAAANV8

https://www.smacktls.com/#freak

Plugin Details

Severity: Medium

ID: 81812

File Name: splunk_622.nasl

Version: 1.12

Type: remote

Family: CGI abuses

Published: 3/13/2015

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:splunk:splunk

Required KB Items: installed_sw/Splunk

Exploit Ease: No exploit is required

Patch Publication Date: 2/23/2015

Vulnerability Publication Date: 1/5/2015

Reference Information

CVE: CVE-2014-3572, CVE-2015-0204

BID: 71936, 71942

CERT: 243585