Vulnerability Description
In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Splunk | Cloud | < 9.1.2312.100 |
| Splunk | Splunk | >= 9.0.0, < 9.0.8 |
Related Weaknesses (CWE)
References
- https://advisory.splunk.com/advisories/SVD-2024-0105Vendor Advisory
- https://research.splunk.com/application/8f0e8380-a835-4f2b-b749-9ce119364df0/Vendor Advisory
- https://advisory.splunk.com/advisories/SVD-2024-0105Vendor Advisory
- https://research.splunk.com/application/8f0e8380-a835-4f2b-b749-9ce119364df0/Vendor Advisory
FAQ
What is CVE-2024-23675?
CVE-2024-23675 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can ...
How severe is CVE-2024-23675?
CVE-2024-23675 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-23675?
Check the references section above for vendor advisories and patch information. Affected products include: Splunk Cloud, Splunk Splunk.