Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 21 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Palantir
Palantir gotham |
|
| Vendors & Products |
Palantir
Palantir gotham |
Fri, 19 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances | |
| Title | Glutton V1 endpoints missing authentication | |
| Weaknesses | CWE-305 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Palantir
Published:
Updated: 2026-02-26T16:07:24.881Z
Reserved: 2024-10-16T19:09:45.689Z
Link: CVE-2024-49587
Updated: 2025-12-19T17:24:37.443Z
Status : Deferred
Published: 2025-12-19T17:15:50.643
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-49587
No data.
OpenCVE Enrichment
Updated: 2025-12-21T21:13:06Z