8.8

CVE-2024-53247

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE).
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerSplunk
Produkt Splunk Enterprise
Version < 9.3.2
Version 9.3
Status affected
Version < 9.2.4
Version 9.2
Status affected
Version < 9.1.7
Version 9.1
Status affected
HerstellerSplunk
Produkt Splunk Secure Gateway
Version < 3.7.13
Version 3.7
Status affected
Version < 3.4.261
Version 3.4
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 5.76% 0.903
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
prodsec@splunk.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.