Overview
- Description
- In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive.
- Source
- prodsec@splunk.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8
- Impact score
- 5.9
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Splunk の複数の脆弱性が FIX:深刻な RCE CVE-2024-45731/45733 に要注意 https://t.co/o0mp2UJeFA #Splunk #SplunkCloudPlatform #SplunkEnterprise #Vulnerability
@iototsecnews
23 Oct 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-45731 (CVSS:8.0, HIGH) is Undergoing Analysis. In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "a..https://t.co/wX0LPSYKiu #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
برای SPLUNK و محصول Enterprise product آن آسیب پذیری های مختلفی منتشر شده است که به هکرها امکان اجرای کد به صورت Remote را می دهند. از معروفترین این آسیب پذیری ها می توان به CVE-2024-45733 و CVE-2024-45732 و CVE-2024-45731 نام برد. https://t.co/Y2P1U3eX7Y https://t.co/ZWDmLoktwj
@AmirHossein_sec
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-45731 (CVSS:8.0, HIGH) is Analyzed. In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "a..https://t.co/wX0LPSYKiu #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "FB935ACC-3899-47DE-B4C0-CB94CAC79AC2", "versionEndExcluding": "9.1.6", "versionStartIncluding": "9.1.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "14D07F5E-504B-447B-988B-BF6ADA59F8D1", "versionEndExcluding": "9.2.3", "versionStartIncluding": "9.2.0" }, { "criteria": "cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "11F038B4-1335-4F4E-9013-E6D6152DCD20" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ], "operator": "OR" } ], "operator": "AND" } ]