Critical Security Alerts, Quarterly Security Patches, and Third Party Bulletins
This page lists announcements of security fixes made in Critical Security Alerts, Quarterly Security Patch Updates, and Third Party Bulletins. For all Advisories, Announcements, and Bulletins, see the Security Advisories list.
Critical Security Alerts
Splunk will publish out-of-band advisories for vulnerabilities that are time-sensitive as soon as possible.
Quarterly Security Patch Updates
Security Updates are collections of security fixes for supported versions of Splunk products. We plan to create Security Patch Updates and make them available through scheduled cloud releases or on-premises maintenance releases for supported versions of Splunk products at the time of the quarterly advisory disclosure. When patches can not be backported due to technical feasibility or otherwise, we will publish mitigation and additional compensating control guidance.
Security Patch Updates are published quarterly in February, June, August and November. Customers are encouraged to sign up for our RSS feed to receive a notification when advisories have been published.
Third-Party Bulletins
Third-Party Bulletins announce security patches for third-party software. Splunk publishes Third Party Bulletins on the same day as Critical Security Alerts or Quarterly Security Patch Updates.
SVD | Date | Title | Severity | CVE |
---|---|---|---|---|
SVD-2023-0215 | 2023-02-14 | February Third Party Package Updates in Splunk Enterprise | High | Multiple |
SVD-2023-0214 | 2023-02-14 | Splunk Response to the Apache Software Foundation Publishing a Vulnerability on Apache Commons Text (CVE-2022-42889) (Text4Shell) | Info | CVE-2022-42889 |
SVD-2022-1113 | 2022-11-02 | November Third Party Package updates in Splunk Enterprise | High | CVE-2020-36518, CVE-2021-32036 |
SVD-2022-1114 | 2022-11-01 | Splunk’s response to OpenSSL’s CVE-2022-3602 and CVE-2022-3786 | High | CVE-2022-3602, CVE-2022-3786 |
SVD-2022-0804 | 2022-08-16 | August Third Party Package updates in Splunk Enterprise and Universal Forwarders | Medium | Multiple |
SVD-2021-1201 | 2021-12-10 | Splunk Security Advisory for Apache Log4j (CVE-2021-44228, CVE-2021-45046 and others) | Critical | CVE-2021-44228, CVE-2021-45046 |
Policy on information provided in Critical Security Alert and Security Patch Updates
Splunk continuously monitors for vulnerabilities discovered through scans, offensive exercises, employees or externally reported by vendors or researchers. Splunk follows industry best practices to discover and remediate vulnerabilities. To report a security vulnerability, please submit to the Security Vulnerability Submission Portal.
Splunk will not provide additional information about the specifics of vulnerabilities beyond what is provided in the Critical Security Alert or the Security Patch Update. Splunk does not distribute active exploit code (i.e. proof of concept code) for vulnerabilities in our products.
Applicability of Critical Security Alerts and Quarterly Security Updates
The Splunk teams regularly evaluate Critical Security Alerts, Quarterly Security Patch Updates and Third Party bulletins as they become available and apply the relevant patches in accordance with applicable change management processes.
Customers requiring additional information that is not addressed in the Critical Patch Update Advisory may obtain information by going to the Support Portal and submitting a New Case.