Splunk Enterprise Multiple Vulnerabilities for RCE
Splunk Enterprise Multiple Vulnerabilities for RCE
Summary
Splunk has disclosed several high-severity vulnerabilities in Splunk Enterprise and Splunk Cloud Platform, which allowattackers to execute remote code on vulnerable systems. The vulnerabilities, including CVE-2024-45733, CVE-2024-45731,and CVE-2024-45732, pose serious security risks and demand immediate attention.
In addition to the remote code execution fl aws, Splunk has also addressed vulnerabilities in third-party packages (idna,certifi ) used in the AWS Add-on.
Affected Systems and/or Application
- Splunk Enterprise for Windows: Versions 9.3.0, 9.2.0 to 9.2.2, 9.1.0 to 9.1.5
- Splunk Cloud Platform: Component: SplunkDeploymentServerConfig – Versions below 9.1.2308.207, 9.1.2312.100 to9.1.2312.109, 9.2.2403.102 to 9.2.2403.102
- Splunk Cloud Platform: Component: Splunkd – Versions 9.2.2403.100 to 9.2.2403.106, 9.1.2312.200 to 9.1.2312.203, Below9.1.2312.111
- Splunk Cloud Platform: Component: Splunk Web – Versions 9.2.2403.100 to 9.2.2403.107, Below 9.1.2312.204
- Splunk Secure Gateway: Versions 3.6.0 to 3.6.16, Below 3.4.259
Technical Details / Attack Overview
Critical Remote Code Execution (RCE) Vulnerabilities Require Immediate Action
Two major vulnerabilities, CVE-2024-45731and CVE-2024-45733, could allow attackers to execute remote code on affected systems. CVE-2024-45731 affects Windows environments with Splunk installed on a separate disk, enabling attackers to drop malicious DLLs into the root directory. CVE-2024-45733 is tied to insecure session storage in versions below 9.2.3 and 9.1.6.
Threats from Low-Privilege Users
Several flaws, like CVE-2024-45732, grant low-privileged users excessive access, such as running unauthorized searches and exposing sensitive data. Additional vulnerabilities allow viewing of host images, crashing the daemon, and manipulating App Key Value Store settings.
Information Disclosure and XSS Issues
Splunk also addressed vulnerabilities related to information disclosure (CVE-2024-45738, CVE-2024-45739) and cross-site scripting (CVE-2024-45740, CVE-2024-45741), which could expose sensitive data or enable malicious script injection.
Please find below the full list of desclosed vulnerabilities:
Recommendations
- Uppgrade Immediately:
- Splunk Enterprise: Upgrade to 9.3.1, 9.2.3, or 9.1.6 or later.
- Splunk Cloud Platform: Ensure your instance is patched by Splunk.
- Mitigation:
- Disable Splunk Web on vulnerable systems.
- Modify access permissions in the SplunkDeploymentServerConfig app.
- Avoid installing Splunk on a separate disk from the system drive.
Additional Information: Splunk has also addressed vulnerabilities in third-party packages (idna, certifi) used in the AWSAdd-on.
Action Required: Apply patches immediately and review security settings to prevent exploitation.
Detection: To detect potential exploitation related to CVE-2024-45731 and CVE-2024-45733, Splunk has releasedcorresponding correlation search: Detection: Splunk RCE Through Arbitrary File Write to Windows System Root | SplunkSecurity Content
What is the CFC doing ?
The CFC will identify and patch affected versions immediatelly to mitigate potential attacks. We will continue to monitorthe situation and send an advisory update if needed.
References
- Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code (gbhackers.com)
- Splunk Enterprise Vulnerabilities Let Attackers Execute Remote Code (cybersecuritynews.com)
- Splunk Vulnerability Disclosure