7.1
CVE-2024-45732
- EPSS 0.04%
- Published 14.10.2024 17:15:11
- Last modified 17.10.2024 13:03:52
- Source prodsec@splunk.com
- Teams watchlist Login
- Open Login
In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a search as the "nobody" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.
Data is provided by the National Vulnerability Database (NVD)
Splunk ≫ Splunk Cloud Platform Version < 9.1.2308.208
Splunk ≫ Splunk Cloud Platform Version >= 9.1.2312.100 < 9.1.2312.110
Splunk ≫ Splunk Cloud Platform Version >= 9.2.2403.102 < 9.2.2403.103
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.094 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
prodsec@splunk.com | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
|
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.