In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-45151 | In Splunk Enterprise versions lower than 9.0.6 and 8.2.12, a malicious actor can send a malformed security assertion markup language (SAML) request to the `/saml/acs` REST endpoint which can cause a denial of service through a crash or hang of the Splunk daemon. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-02-28T11:03:56.605Z
Reserved: 2023-08-16T22:07:52.838Z
Link: CVE-2023-40593

No data.

Status : Modified
Published: 2023-08-30T17:15:09.853
Modified: 2024-11-21T08:19:47.123
Link: CVE-2023-40593

No data.

No data.