CVE-2024-45732
EUVD-2024-4164014.10.2024, 17:15
In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a search as the "nobody" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| splunk | splunk | 9.2.0 ≤ 𝑥 < 9.2.3 |
| splunk | splunk | 9.3.0 |
| splunk | splunk_cloud_platform | 𝑥 < 9.1.2308.208 |
| splunk | splunk_cloud_platform | 9.1.2312.100 ≤ 𝑥 < 9.1.2312.110 |
| splunk | splunk_cloud_platform | 9.2.2403.102 ≤ 𝑥 < 9.2.2403.103 |
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| splunk | splunk_enterprise | 9.3 ≤ 𝑥 < 9.3.1 | ADP |
| splunk | splunk_enterprise | 9.2 ≤ 𝑥 < 9.2.3 | ADP |
| splunk | splunk_cloud_platform | 9.2.2403 ≤ 𝑥 < 9.2.2403.103 | ADP |
| splunk | splunk_cloud_platform | 9.1.2312 ≤ 𝑥 < 9.1.2312.200 | ADP |
| splunk | splunk_cloud_platform | 9.1.2308 ≤ 𝑥 < 9.1.2308.208 | ADP |
Common Weakness Enumeration