vulnerability
Splunk: CVE-2022-37437: Ingest Actions UI in Splunk Enterprise 9.0.0 disabled TLS certificate validation
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:N) | Aug 16, 2022 | Apr 7, 2025 | Oct 8, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:N)
Published
Aug 16, 2022
Added
Apr 7, 2025
Modified
Oct 8, 2025
Description
When usingIngest Actionsto configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web,TLS certificate validationis not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Destination through Splunk Web and only applies to environments that have configured TLS certificate validation. It does not apply to Destinations configured directly in the outputs.conf configuration file. The vulnerability affects Splunk Enterprise version 9.0.0 and does not affect versions below 9.0.0, including the 8.1.x and 8.2.x versions.
Solution
splunk-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.