Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
splunk_cloud_platform Vendor: splunk

About This Product

splunk_cloud_platform is a software product offered by splunk. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 93 known vulnerabilities affecting splunk splunk_cloud_platform. This includes 31 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2022 to 2026, indicating a recent active security attention. 52 medium-severity issues and 10 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2022-32151 2022-06-15 2024-11-21 7.4 6.4 Likely
CVE-2022-32152 2022-06-15 2024-11-21 8.1 6.5 Likely
CVE-2022-32153 2022-06-15 2024-11-21 8.1 6.8 Likely
CVE-2022-32154 2022-06-15 2024-11-21 6.8 4.0 Unknown
CVE-2022-32155 2022-06-15 2024-11-21 7.5 5.0 Likely
CVE-2022-37438 2022-08-16 2024-11-21 2.6 - -
CVE-2022-43561 2022-11-03 2024-11-21 6.4 - -
CVE-2022-43571 2022-11-03 2024-11-21 8.8 - -
CVE-2022-43562 2022-11-04 2024-11-21 3.0 - -
CVE-2022-43563 2022-11-04 2024-11-21 8.1 - -
CVE-2022-43564 2022-11-04 2024-11-21 4.9 - -
CVE-2022-43565 2022-11-04 2024-11-21 8.1 - -
CVE-2022-43566 2022-11-04 2024-11-21 7.3 - -
CVE-2022-43567 2022-11-04 2024-11-21 8.8 - -
CVE-2022-43568 2022-11-04 2024-11-21 8.8 - -
CVE-2022-43569 2022-11-04 2024-11-21 8.0 - -
CVE-2022-43570 2022-11-04 2024-11-21 8.8 - -
CVE-2022-43572 2022-11-04 2024-11-21 7.5 - -
CVE-2023-22931 2023-02-14 2024-11-21 4.3 - -
CVE-2023-22932 2023-02-14 2024-11-21 8.7 - -
CVE-2023-22933 2023-02-14 2024-11-21 8.0 - -
CVE-2023-22934 2023-02-14 2024-11-21 7.3 - -
CVE-2023-22935 2023-02-14 2024-11-21 8.1 - -
CVE-2023-22936 2023-02-14 2024-11-21 6.3 - -
CVE-2023-22937 2023-02-14 2024-11-21 4.3 - -
CVE-2023-22938 2023-02-14 2024-11-21 4.3 - -
CVE-2023-22939 2023-02-14 2024-11-21 8.1 - -
CVE-2023-22940 2023-02-14 2024-11-21 6.3 - -
CVE-2023-22941 2023-02-14 2024-11-21 6.5 - -
CVE-2023-32706 2023-06-01 2024-11-21 7.7 - -
CVE-2023-32707 2023-06-01 2024-11-21 8.8 - -
CVE-2023-32708 2023-06-01 2024-11-21 7.2 - -
CVE-2023-32709 2023-06-01 2024-11-21 4.3 - -
CVE-2023-32710 2023-06-01 2024-11-21 4.8 - -
CVE-2023-32716 2023-06-01 2024-11-21 6.5 - -
CVE-2023-32717 2023-06-01 2024-11-21 4.3 - -
CVE-2023-40592 2023-08-30 2024-11-21 8.4 - -
CVE-2023-40593 2023-08-30 2024-11-21 6.3 - -
CVE-2023-40594 2023-08-30 2024-11-21 6.5 - -
CVE-2023-40595 2023-08-30 2024-11-21 8.8 - -
CVE-2023-40597 2023-08-30 2024-11-21 7.8 - -
CVE-2023-40598 2023-08-30 2024-11-21 8.5 - -
CVE-2024-36983 2024-07-01 2025-03-07 8.0 - -
CVE-2024-36990 2024-07-01 2024-11-21 6.5 - -
CVE-2024-36992 2024-07-01 2024-11-21 5.4 - -
CVE-2024-36993 2024-07-01 2024-11-21 5.4 - -
CVE-2024-36994 2024-07-01 2024-11-21 5.4 - -
CVE-2024-36995 2024-07-01 2024-11-21 5.4 - -
CVE-2024-36996 2024-07-01 2024-11-21 5.3 - -
CVE-2024-36997 2024-07-01 2025-03-07 8.1 - -
CVE-2024-45732 2024-10-14 2024-10-17 7.1 - -
CVE-2024-45735 2024-10-14 2024-10-16 4.3 - -
CVE-2024-45736 2024-10-14 2024-10-16 6.5 - -
CVE-2024-45737 2024-10-14 2024-10-16 4.3 - -
CVE-2024-45740 2024-10-14 2024-10-17 5.4 - -
CVE-2024-45741 2024-10-14 2024-10-17 5.4 - -
CVE-2024-53244 2024-12-10 2025-03-06 5.7 - -
CVE-2024-53245 2024-12-10 2025-03-06 3.1 - -
CVE-2024-53246 2024-12-10 2025-03-10 5.3 - -
CVE-2025-20226 2025-03-26 2025-07-21 5.7 - -
CVE-2025-20227 2025-03-26 2025-07-21 4.3 - -
CVE-2025-20228 2025-03-26 2025-07-21 6.5 - -
CVE-2025-20229 2025-03-26 2025-07-21 8.0 - -
CVE-2025-20232 2025-03-26 2025-07-21 5.7 - -
CVE-2025-20297 2025-06-02 2025-08-01 4.3 - -
CVE-2025-20300 2025-07-07 2025-07-21 4.3 - -
CVE-2025-20320 2025-07-07 2025-07-21 6.3 - -
CVE-2025-20321 2025-07-07 2025-07-21 6.5 - -
CVE-2025-20322 2025-07-07 2025-07-21 4.3 - -
CVE-2025-20324 2025-07-07 2025-07-21 5.4 - -
CVE-2025-20325 2025-07-07 2025-08-01 3.1 - -
CVE-2025-20366 2025-10-01 2025-10-08 6.5 - -
CVE-2025-20367 2025-10-01 2025-10-08 5.7 - -
CVE-2025-20368 2025-10-01 2025-10-08 5.7 - -
CVE-2025-20369 2025-10-01 2025-10-08 4.6 - -
CVE-2025-20370 2025-10-01 2025-10-08 4.9 - -
CVE-2025-20371 2025-10-01 2025-10-08 7.5 - -
CVE-2025-20378 2025-11-12 2025-12-03 3.1 - -
CVE-2025-20379 2025-11-12 2025-12-03 3.5 - -
CVE-2025-20382 2025-12-03 2025-12-05 3.5 - -
CVE-2025-20383 2025-12-03 2025-12-05 4.3 - -
CVE-2025-20384 2025-12-03 2025-12-05 5.3 - -
CVE-2025-20385 2025-12-03 2025-12-05 2.4 - -
CVE-2025-20388 2025-12-03 2025-12-05 2.7 - -
CVE-2025-20389 2025-12-03 2025-12-05 4.3 - -
CVE-2026-20137 2026-02-18 2026-02-20 3.5 - -
CVE-2026-20139 2026-02-18 2026-02-20 4.3 - -
CVE-2026-20144 2026-02-18 2026-02-23 6.8 - -
CVE-2026-20162 2026-03-11 2026-03-23 6.3 - -
CVE-2026-20163 2026-03-11 2026-03-24 7.2 - -
CVE-2026-20164 2026-03-11 2026-03-24 6.5 - -
CVE-2026-20165 2026-03-11 2026-03-24 6.3 - -
CVE-2026-20166 2026-03-11 2026-03-24 5.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for splunk splunk_cloud_platform by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.