From this webpage screenshot, the following key vulnerability information can be obtained: 1. Vulnerability ID: SVD-2024-1009 2. CVE ID: CVE-2024-45739 3. Release Date: October 14, 2024 4. Update Date: October 14, 2024 5. CVSSv3.1 Score: 4.9, Medium 6. CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N 7. CWE ID: CWE-200 8. Description: In Splunk Enterprise versions 9.3.1, 9.2.3, and 9.1.6, the software may expose plaintext passwords of local native Splunk users. This exposure occurs when the Splunk Enterprise AdminManager log channel is configured to DEBUG log level. 9. Solution: - Determine whether debug logging is enabled for the AdminManager log channel. - Upgrade to Splunk Enterprise 9.3.1, 9.2.3, or a later version. - Delete log files for the AdminManager component. - Delete log file events for the AdminManager component. 10. Product Status: - Splunk Enterprise 9.3: 9.3.0 → 9.3.1 - Splunk Enterprise 9.2: 9.2.0 to 9.2.2 → 9.2.3 - Splunk Enterprise 9.1: 9.1.0 to 9.1.5 → 9.1.6 11. Mitigations and Workarounds: - Configure the AdminManager log channel to a less verbose log level than DEBUG. - Delete log files for the AdminManager component. - Delete log file events for the AdminManager component. 12. Detection: - Splunk Sensitive Information Disclosure in DEBUG Logging Channels 13. Severity: 4.9, Medium 14. Acknowledgments: - Eric McGinnis, Splunk - Rod Soto, Splunk