First published: Mon Oct 14 2024(Updated: )
In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Splunk | >=9.1.0<9.1.6 | |
Splunk | >=9.2.0<9.2.3 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45733 is classified as a low-severity vulnerability due to its requirement for low-privileged user access.
To mitigate CVE-2024-45733, upgrade Splunk Enterprise to version 9.2.3 or 9.1.6 or later.
CVE-2024-45733 allows a low-privileged user to perform Remote Code Execution due to insecure session storage.
CVE-2024-45733 affects Splunk Enterprise versions prior to 9.2.3 and 9.1.6.
CVE-2024-45733 requires a low-privileged authenticated user to exploit the vulnerability.