Improper Access Control in Splunk Enterprise and Secure Gateway App
CVE-2024-53243
4.3MEDIUM
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 10 December 2024
Summary
In affected versions of Splunk Enterprise and the Splunk Secure Gateway app, a vulnerability exists that allows low-privileged users to access alert search query results through KVstore endpoints. This occurs due to insufficient access control mechanisms, posing a risk of unauthorized data exposure.
Affected Version(s)
Splunk Enterprise 9.3 < 9.3.2
Splunk Enterprise 9.2 < 9.2.4
Splunk Enterprise 9.1 < 9.1.7
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Credit
Anton (therceman)