Vulnerability Details CVE-2023-40593
In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 33.2%
CVSS Severity
CVSS v3 Score 6.3
Products affected by CVE-2023-40593
-
cpe:2.3:a:splunk:splunk:8.2.0
-
cpe:2.3:a:splunk:splunk:8.2.10
-
cpe:2.3:a:splunk:splunk:8.2.9
-
cpe:2.3:a:splunk:splunk:9.0.0
-
cpe:2.3:a:splunk:splunk:9.0.3
-
cpe:2.3:a:splunk:splunk:9.0.4
-
cpe:2.3:a:splunk:splunk_cloud_platform:-
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.1.2103
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2105
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2106
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2107
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2109
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2111
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2112
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2201
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2202
-
cpe:2.3:a:splunk:splunk_cloud_platform:8.2.2203
-
cpe:2.3:a:splunk:splunk_cloud_platform:9.0.2209
-
cpe:2.3:a:splunk:splunk_cloud_platform:9.0.2209.3
-
cpe:2.3:a:splunk:splunk_cloud_platform:9.0.2305.100