In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Oct 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Splunk splunk |
|
CPEs | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Microsoft
Microsoft windows Splunk splunk |
Tue, 15 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Splunk
Splunk splunk Enterprise |
|
CPEs | cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:* | |
Vendors & Products |
Splunk
Splunk splunk Enterprise |
|
Metrics |
ssvc
|
Mon, 14 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration. | |
Title | Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Splunk
Published: 2024-10-14T17:03:36.497Z
Updated: 2024-10-30T15:06:24.728Z
Reserved: 2024-09-05T21:35:21.290Z
Link: CVE-2024-45733
Vulnrichment
Updated: 2024-10-15T16:25:39.525Z
NVD
Status : Analyzed
Published: 2024-10-14T17:15:11.657
Modified: 2024-10-16T22:26:12.937
Link: CVE-2024-45733
Redhat
No data.