First published: Mon Jan 22 2024(Updated: )
In Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3, Splunk Enterprise does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | >=9.0.0<9.0.8 | |
Splunk Splunk | >=9.1.0<9.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23678 is categorized as a high severity vulnerability due to its potential for unsafe deserialization of untrusted data.
CVE-2024-23678 affects Splunk Enterprise for Windows versions below 9.0.8 and 9.1.3.
To fix CVE-2024-23678, upgrade to Splunk Enterprise versions 9.0.8 or 9.1.3 or later.
CVE-2024-23678 enables an attacker to exploit unsafe deserialization, which can potentially compromise the security of the system.
Yes, CVE-2024-23678 specifically affects Splunk Enterprise for Windows.