In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-41737 In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Oct 2024 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Splunk splunk
CPEs cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Splunk splunk

Tue, 15 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk splunk Enterprise
CPEs cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*
Vendors & Products Splunk
Splunk splunk Enterprise
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.
Title Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Splunk

Published:

Updated: 2025-02-28T11:03:46.564Z

Reserved: 2024-09-05T21:35:21.290Z

Link: CVE-2024-45733

cve-icon Vulnrichment

Updated: 2024-10-15T16:25:39.525Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T17:15:11.657

Modified: 2024-10-16T22:26:12.937

Link: CVE-2024-45733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.