vulnerability
Splunk: CVE-2024-56201: Third-Party Package Updates in Splunk/UniversalForwarder Docker - April 2025
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Apr 2, 2025 | Sep 30, 2025 | Oct 31, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Apr 2, 2025
Added
Sep 30, 2025
Modified
Oct 31, 2025
Description
Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party Packages in the “splunk/universalforwarder“ Docker image with image tags “9.4.1“, “9.3.3“, “9.2.5“, “9.1.8“, and “latest“. Docker images with tags “9.4“, “9.3“, “9.2“, or “9.1“, also include these fixes. Third Party packages remedied includes the following: 1Upgrade jinja2 at usr/lib/python3.9/site-packages/jinja2 to 3.1.5 2Upgrade the requests at /usr/lib/python3.9/site-packages/requests to 2.32.3. Note, tag 9.4.0 includes the updated package.
Solution
splunk-upgrade-latest
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.