First published: Mon Jul 01 2024(Updated: )
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, a low-privileged user that does not hold the admin or power Splunk roles could cause a Remote Code Execution through an external lookup that references the “splunk_archiver“ application.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Enterprise | <9.2.2<9.1.5<9.0.10 | |
Splunk | >=9.0.0<9.0.10 | |
Splunk | >=9.1.0<9.1.5 | |
Splunk | >=9.2.0<9.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36985 is classified as a low severity vulnerability.
To mitigate CVE-2024-36985, upgrade Splunk Enterprise to version 9.2.2 or higher, or 9.1.5 or higher, or 9.0.10 or higher.
CVE-2024-36985 affects low-privileged users in Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10.
CVE-2024-36985 is a Remote Code Execution vulnerability.
CVE-2024-36985 is related to the 'splunk_archiver' application in Splunk Enterprise.