vulnerability
Splunk: CVE-2021-31559: S2S TcpToken authentication bypass
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | May 3, 2022 | Apr 7, 2025 | Oct 31, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
May 3, 2022
Added
Apr 7, 2025
Modified
Oct 31, 2025
Description
A crafted request bypasses S2S TCP Token authentication writing arbitrary events to an index in Splunk Enterprise Indexer 8.1 versions before 8.1.5 and 8.2 versions before 8.2.1. The vulnerability impacts Indexers configured to use TCPTokens. It does not impact Universal Forwarders. See Enable a receiver for more information on configuring an indexer to listen for UF traffic. See Control forwarder access for more information on securing UF to Indexer traffic with TcpTokens. When Splunk forwarding is secured using TLS, the attack requires compromising the certificate. As a partial mitigation and a security best practice, see Configure Splunk forwarding to use your own SSL certificates. Implementation reduces the severity to Medium.
Solution
splunk-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.