First published: Tue Dec 10 2024(Updated: )
In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and versions below 3.2.462, 3.7.18, and 3.8.5 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could see alert search query responses using Splunk Secure Gateway App Key Value Store (KVstore) collections endpoints due to improper access control.
Credit: prodsec@splunk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Enterprise | <9.3.2 | |
Splunk Enterprise | <9.2.4 | |
Splunk Enterprise | <9.1.7 | |
Splunk Secure Gateway | <3.2.462 | |
Splunk Secure Gateway | <3.7.18 | |
Splunk Secure Gateway | <3.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53243 is considered a low-severity vulnerability affecting Splunk Enterprise and Splunk Secure Gateway app.
To fix CVE-2024-53243, upgrade to Splunk Enterprise version 9.3.2 or higher, or to version 3.2.462 or higher of the Splunk Secure Gateway app.
CVE-2024-53243 affects low-privileged users without the 'admin' or 'power' roles in vulnerable versions of Splunk software.
Vulnerable versions include Splunk Enterprise below 9.3.2, 9.2.4, 9.1.7 and Splunk Secure Gateway app below 3.2.462, 3.7.18, and 3.8.5.
CVE-2024-53243 allows low-privileged users to view alert search query responses, potentially exposing sensitive query information.