First published: Mon Jan 22 2024(Updated: )
In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Cloud Platform | <9.1.2312.100 | |
Splunk | >=9.0.0<9.0.8 | |
Splunk | >=9.1.0<9.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23675 is classified as a high severity vulnerability due to its potential to allow unauthorized deletion of KV Store collections.
To fix CVE-2024-23675, upgrade Splunk Enterprise to version 9.0.8 or 9.1.3 or later.
CVE-2024-23675 affects Splunk Enterprise versions below 9.0.8 and 9.1.3.
CVE-2024-23675 can lead to improper handling of permissions, resulting in the potential unauthorized deletion of KV Store collections.
Currently, there are no recommended workarounds for CVE-2024-23675 other than upgrading to a secure version.