vulnerability
Splunk: CVE-2023-40593: Denial of Service (DoS) in Splunk Enterprise Using a Malformed SAML Request
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:S/C:N/I:N/A:C) | Aug 30, 2023 | Apr 7, 2025 | Oct 31, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:N/I:N/A:C)
Published
Aug 30, 2023
Added
Apr 7, 2025
Modified
Oct 31, 2025
Description
In Splunk Enterprise versions lower than 9.0.6, and 8.2.12, an attacker can send a malformed security assertion markup language (SAML) request to the/saml/acsREST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.The SAML extensible markup language (XML) parser does not fail SAML signature validation when the attacker modifies the URI in the SAML request. Instead it attempts to access the modified URI, which causes the Splunk daemon to crash or hang.
Solution
splunk-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.