Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-41737 | In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration. |
Wed, 16 Oct 2024 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Splunk splunk |
|
| CPEs | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Splunk splunk |
Tue, 15 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk
Splunk splunk Enterprise |
|
| CPEs | cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Splunk
Splunk splunk Enterprise |
|
| Metrics |
ssvc
|
Mon, 14 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could perform a Remote Code Execution (RCE) due to an insecure session storage configuration. | |
| Title | Remote Code Execution (RCE) due to insecure session storage configuration in Splunk Enterprise on Windows | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Splunk
Published:
Updated: 2025-02-28T11:03:46.564Z
Reserved: 2024-09-05T21:35:21.290Z
Link: CVE-2024-45733
Updated: 2024-10-15T16:25:39.525Z
Status : Analyzed
Published: 2024-10-14T17:15:11.657
Modified: 2024-10-16T22:26:12.937
Link: CVE-2024-45733
No data.
OpenCVE Enrichment
No data.
EUVD