Vulnerability Description
In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and versions below 3.2.462, 3.7.18, and 3.8.5 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could see alert search query responses using Splunk Secure Gateway App Key Value Store (KVstore) collections endpoints due to improper access control.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-53243?
CVE-2024-53243 is a vulnerability with a CVSS score of 4.3 (MEDIUM). In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and versions below 3.2.462, 3.7.18, and 3.8.5 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not...
How severe is CVE-2024-53243?
CVE-2024-53243 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-53243?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.