Low-Privileged User RCE Vulnerability in Splunk Enterprise and Secure Gateway
CVE-2024-53247

8.8HIGH

Key Information:

Vendor
Splunk
Vendor
CVE Published:
10 December 2024

What is CVE-2024-53247?

CVE-2024-53247 is a vulnerability found in specific versions of Splunk Enterprise and the Splunk Secure Gateway app. Splunk is a widely used platform for analyzing machine-generated data to derive insights and improve operational intelligence. This vulnerability permits low-privileged users—those without elevated roles such as "admin" or "power"—to execute arbitrary code remotely. This could have grave implications for organizations relying on Splunk for their critical data operations, potentially leading to unauthorized access and manipulation of sensitive data or systems.

Technical Details

The vulnerability affects Splunk Enterprise versions prior to 9.3.2, 9.2.4, and 9.1.7, as well as vulnerable versions of the Splunk Secure Gateway app on the Splunk Cloud Platform (specifically below versions 3.2.461 and 3.7.13). Due to improper access control mechanisms, low-privileged users can exploit this flaw to gain unauthorized execution capabilities on the affected systems, leading to Remote Code Execution (RCE).

Impact of the Vulnerability

  1. Unauthorized System Access: Low-privileged users could gain control over systems that should be restricted, leading to potential exploitation of sensitive organizational data.

  2. Data Manipulation and Breaches: Once unauthorized access is achieved, there is a risk of data manipulation, loss, or theft, jeopardizing the integrity and confidentiality of critical information.

  3. Increased Attack Surface: This vulnerability may provide a gateway for further attacks or escalation privileges, which could lead to more extensive system compromises, affecting overall organizational security posture.

Affected Version(s)

Splunk Enterprise 9.3 < 9.3.2

Splunk Enterprise 9.2 < 9.2.4

Splunk Enterprise 9.1 < 9.1.7

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

Danylo Dmytriiev (DDV_UA)
.