In Splunk Enterprise versions below 9.0.5, 8.2.11. and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, a low-privileged user who holds the âuserâ role can see the hashed version of the initial user name and password for the Splunk instance by using the ârestâ SPL command against the âconf-user-seedâ REST endpoint.Read More
CVE-2023-32709

