Search In Site

Security Alerts

Severity Level: High

Title: 

Security Updates – Splunk Products

Summary:

Splunk released security updates to address several vulnerabilities in their products.

Critical Remote Code Execution (RCE) Vulnerabilities

 • CVE-2024-45731: Affects Windows installations where Splunk Enterprise is installed on a separate disk. Attackers could potentially write malicious DLL files to the Windows system root directory, leading to system compromise.

 • CVE-2024-45733: Results from insecure session storage configuration. This vulnerability affects Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6.

Unauthorized Access by Low-Privilege Users

• CVE-2024-45732: Allows low-privileged users to run searches as the "nobody" user within the SplunkDeploymentServerConfig app, risking exposure of restricted data.

• CVE-2024-45734: Enables unauthorized users to view images on the host machine.

• CVE-2024-45735: Grants access to sensitive configuration data in the Splunk Secure Gateway App.

 • CVE-2024-45736: Allows low-privileged users to crash the Splunk daemon.

• CVE-2024-45737: Enables manipulation of the maintenance mode state of the App Key Value Store.

Information Disclosure and Cross-Site Scripting (XSS)

• CVE-2024-45738 & CVE-2024-45739: These vulnerabilities could lead to sensitive information disclosure.

 • CVE-2024-45740 & CVE-2024-45741: Persistent XSS vulnerabilities that could be exploited to inject malicious scripts into web pages viewed by other users.

Recommendations:

recommends applying the security updates recently released by Splunk.

References:

click here