Tuesday, April 22, 2025
HomeCVE/vulnerabilitySplunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Published on

SIEM as a Service

Follow Us on Google News

Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to execute remote code.

These vulnerabilities, primarily affecting Windows installations, highlight the critical need for organizations to update and secure their systems promptly.

Overview of the Security Advisories

Splunk, a leading provider of data analytics and monitoring solutions, has released a series of security advisories detailing vulnerabilities in its Splunk Enterprise product.

- Advertisement - Google News

These advisories are part of Splunk’s ongoing commitment to transparency and security, providing users with essential information to protect their systems. 

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

The vulnerabilities were disclosed on October 14, 2024, and have been categorized as high severity due to their potential impact on system integrity and security.

Splunk recommends that all users subscribe to their mailing list and RSS feed for timely updates on security advisories.

Detailed Vulnerability Breakdown

The table below summarizes the key vulnerabilities identified in Splunk Enterprise:

Advisory IDDescriptionSeverityCVE ID
SVD-2024-1003Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on WindowsHighCVE-2024-45733
SVD-2024-1002Low-privileged user could run search as nobody in SplunkDeploymentServerConfig appHighCVE-2024-45732
SVD-2024-1001Potential RCE through arbitrary file write to Windows system root directory when installed on separate diskHighCVE-2024-45731
SVD-2024-0711Path Traversal on the “/modules/messaging/“ endpoint in Splunk Enterprise on WindowsHighCVE-2024-36991
SVD-2024-0705RCE through an external lookup due to “copybuckets.py“ script in the “splunk_archiver“ applicationHighCVE-2024-36985
SVD-2024-0704RCE through Serialized Session Payload in Splunk Enterprise on WindowsHighCVE-2024-36984
SVD-2024-0703Command Injection using External LookupsHighCVE-2024-36983
SVD-2024-0702Denial of Service through null pointer reference in “cluster/config” REST endpointHighCVE-2024-36982
SVD-2024-0302Risky command safeguards bypass in Dashboard Examples HubHighCVE-2024-29946
SVD-2024-0301Splunk Authentication Token Exposure in Debug LogHighCVE-2024-29945
SVD-2024-0111Sensitive Information Disclosure to Internal Log FilesHighCVE-2023-46230
SVD-2024-0110Session Token Disclosure to Internal Log FilesHighCVE-2023-46231
SVD-2024-0108Deserialization of Untrusted Data through Path Traversal from Separate Disk PartitionHighCVE-2024-23678

The disclosed vulnerabilities primarily affect Windows installations of Splunk Enterprise, where insecure configurations and potential code execution paths pose significant risks.

Attackers exploiting these vulnerabilities could gain unauthorized access, execute arbitrary code, or disrupt services, leading to potential data breaches or system outages. 

Organizations using Splunk Enterprise are urged to apply the necessary patches and updates provided by Splunk.

Furthermore, reviewing system configurations and implementing best security practices can mitigate these risks.

Recommendations for Users

Splunk advises users to:

  1. Update Systems: Apply the latest patches and updates immediately.
  2. Monitor Security Advisories: Subscribe to Splunk’s mailing list and RSS feed for timely notifications.
  3. Review Configurations: Ensure that system configurations adhere to security best practices.
  4. Engage with Support: For additional information or unresolved issues, visit the Splunk Support Portal.

By taking these proactive steps, organizations can better protect their systems against potential exploits targeting these vulnerabilities.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide(PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...