CVE-2024-45735

In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the "admin" or "power" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*

History

16 Oct 2024, 22:20

Type Values Removed Values Added
CPE cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
First Time Splunk
Splunk splunk
Splunk splunk Cloud Platform
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
References () https://advisory.splunk.com/advisories/SVD-2024-1005 - () https://advisory.splunk.com/advisories/SVD-2024-1005 - Vendor Advisory
References () https://research.splunk.com/application/0a3d6035-7bef-4dfa-b01e-84349edac3b4/ - () https://research.splunk.com/application/0a3d6035-7bef-4dfa-b01e-84349edac3b4/ - Vendor Advisory

14 Oct 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-14 17:15

Updated : 2024-10-16 22:20


NVD link : CVE-2024-45735

Mitre link : CVE-2024-45735


JSON object : View

Products Affected

splunk

  • splunk
  • splunk_cloud_platform