In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://advisory.splunk.com/advisories/SVD-2023-0607 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-01-15T17:05:44.940Z
Reserved: 2023-05-11T20:55:59.872Z
Link: CVE-2023-32713

Updated: 2024-08-02T15:25:37.041Z

Status : Modified
Published: 2023-06-01T17:15:10.453
Modified: 2024-11-21T08:03:54.067
Link: CVE-2023-32713

No data.