4.9 • 696 Ratings
🗓️ 20 June 2022
⏱️ 9 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, June 20th, 2020 edition of the Sands and the Storm Center's Stormcast. |
0:07.8 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:14.5 | Splunk, late last week, released a critical patch for the Splunk Enterprise Deployment Server. The deployment server is an |
0:23.0 | optional component, but it's very commonly enabled because it allows you to centrally manage |
0:28.5 | Splunk forwarders. To accomplish this, the deployment server is able to essentially push |
0:34.0 | configuration files to Splunk Forwarders and other Splunk instances that are used within an organization. |
0:41.3 | So it's a simple central configuration tool. |
0:45.3 | These configuration files may also include binaries that are executed by the recipient of the package. |
0:53.3 | Now, before you think that this is actually the root of the problem here, it's part of it, |
0:58.0 | but not really what's causing the vulnerability. |
1:02.6 | Typically, the deployment server just pushes files out to the forwarder, so code is executed |
1:08.5 | on the forwarder as instructed by deployment server. The forward itself |
1:14.0 | should really only receive those files, but the vulnerability that was patched late last week |
1:20.7 | does allow forwarders to actually execute commands on the Splunk deployment server. |
1:28.9 | Now, since you typically have these forwarders installed throughout the enterprise on different |
1:33.5 | endpoints, what this means is if one of those endpoints gets compromised, then an attacker |
1:39.1 | could use the Splunk forwarder to compromise the deployment server. |
1:43.0 | And once the deployment server is compromised, then of course the attacker could compromise |
1:48.3 | the enterprise by pushing malicious configuration from the deployment server. |
1:54.4 | And of course, these forwarders, they have to read all these log files, which requires |
1:59.7 | privileges. |
2:00.8 | So they typically do run as |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.