CVE-2024-45732 (GCVE-0-2024-45732)

Vulnerability from cvelistv5 – Published: 2024-10-14 17:03 – Updated: 2025-02-28 11:03
VLAI?
Title
Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app
Summary
In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a search as the "nobody" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.
CWE
  • CWE-862 - The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Assigner
Impacted products
Vendor Product Version
Splunk Splunk Enterprise Affected: 9.3 , < 9.3.1 (custom)
Affected: 9.2 , < 9.2.3 (custom)
Create a notification for this product.
    Splunk Splunk Cloud Platform Affected: 9.2.2403 , < 9.2.2403.103 (custom)
Affected: 9.1.2312 , < 9.1.2312.110, 9.1.2312.200 (custom)
Affected: 9.1.2308 , < 9.1.2308.208 (custom)
Create a notification for this product.
Credits
Anton (therceman)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "splunk_enterprise",
            "vendor": "splunk",
            "versions": [
              {
                "lessThan": "9.3.1",
                "status": "affected",
                "version": "9.3",
                "versionType": "custom"
              },
              {
                "lessThan": "9.2.3",
                "status": "affected",
                "version": "9.2",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "splunk_cloud_platform",
            "vendor": "splunk",
            "versions": [
              {
                "lessThan": "9.2.2403.103",
                "status": "affected",
                "version": "9.2.2403",
                "versionType": "custom"
              },
              {
                "lessThan": "9.1.2312.200",
                "status": "affected",
                "version": "9.1.2312",
                "versionType": "custom"
              },
              {
                "status": "unaffected",
                "version": "9.1.2312.110"
              },
              {
                "lessThan": "9.1.2308.208",
                "status": "affected",
                "version": "9.1.2308",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45732",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T16:30:27.363227Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-15T16:34:10.045Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Splunk Enterprise",
          "vendor": "Splunk",
          "versions": [
            {
              "lessThan": "9.3.1",
              "status": "affected",
              "version": "9.3",
              "versionType": "custom"
            },
            {
              "lessThan": "9.2.3",
              "status": "affected",
              "version": "9.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Splunk Cloud Platform",
          "vendor": "Splunk",
          "versions": [
            {
              "lessThan": "9.2.2403.103",
              "status": "affected",
              "version": "9.2.2403",
              "versionType": "custom"
            },
            {
              "lessThan": "9.1.2312.110, 9.1.2312.200",
              "status": "affected",
              "version": "9.1.2312",
              "versionType": "custom"
            },
            {
              "lessThan": "9.1.2308.208",
              "status": "affected",
              "version": "9.1.2308",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Anton (therceman)"
        }
      ],
      "datePublic": "2024-10-14T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could run a search as the \"nobody\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data."
            }
          ],
          "value": "In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could run a search as the \"nobody\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "The software does not perform an authorization check when an actor attempts to access a resource or perform an action.",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-28T11:03:50.807Z",
        "orgId": "42b59230-ec95-491e-8425-5a5befa1a469",
        "shortName": "Splunk"
      },
      "references": [
        {
          "url": "https://advisory.splunk.com/advisories/SVD-2024-1002"
        },
        {
          "url": "https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/"
        }
      ],
      "source": {
        "advisory": "SVD-2024-1002"
      },
      "title": "Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "42b59230-ec95-491e-8425-5a5befa1a469",
    "assignerShortName": "Splunk",
    "cveId": "CVE-2024-45732",
    "datePublished": "2024-10-14T17:03:35.668Z",
    "dateReserved": "2024-09-05T21:35:21.290Z",
    "dateUpdated": "2025-02-28T11:03:50.807Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*\", \"versionStartIncluding\": \"9.2.0\", \"versionEndExcluding\": \"9.2.3\", \"matchCriteriaId\": \"14D07F5E-504B-447B-988B-BF6ADA59F8D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"11F038B4-1335-4F4E-9013-E6D6152DCD20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1.2308.208\", \"matchCriteriaId\": \"557AF53F-284F-43D2-9EA1-2E0E628DC303\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.1.2312.100\", \"versionEndExcluding\": \"9.1.2312.110\", \"matchCriteriaId\": \"6DAA9B36-48A2-45BF-97B9-E548E80DF83C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.2.2403.102\", \"versionEndExcluding\": \"9.2.2403.103\", \"matchCriteriaId\": \"200953F8-DF1D-4C6C-BE36-0866700A5F55\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \\\"admin\\\" or \\\"power\\\" Splunk roles could run a search as the \\\"nobody\\\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.\"}, {\"lang\": \"es\", \"value\": \"En las versiones de Splunk Enterprise anteriores a 9.3.1, 9.2.0 y 9.2.3, y en las versiones de Splunk Cloud Platform anteriores a 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 y 9.1.2308.208, un usuario con privilegios bajos que no tenga los roles de Splunk \\\"admin\\\" o \\\"power\\\" podr\\u00eda ejecutar una b\\u00fasqueda como el usuario de Splunk \\\"nobody\\\" en la aplicaci\\u00f3n SplunkDeploymentServerConfig. Esto podr\\u00eda permitir que el usuario con privilegios bajos acceda a datos potencialmente restringidos.\"}]",
      "id": "CVE-2024-45732",
      "lastModified": "2024-10-17T13:03:52.153",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"prodsec@splunk.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N\", \"baseScore\": 7.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
      "published": "2024-10-14T17:15:11.410",
      "references": "[{\"url\": \"https://advisory.splunk.com/advisories/SVD-2024-1002\", \"source\": \"prodsec@splunk.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/\", \"source\": \"prodsec@splunk.com\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "prodsec@splunk.com",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"prodsec@splunk.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-45732\",\"sourceIdentifier\":\"prodsec@splunk.com\",\"published\":\"2024-10-14T17:15:11.410\",\"lastModified\":\"2024-10-17T13:03:52.153\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \\\"admin\\\" or \\\"power\\\" Splunk roles could run a search as the \\\"nobody\\\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.\"},{\"lang\":\"es\",\"value\":\"En las versiones de Splunk Enterprise anteriores a 9.3.1, 9.2.0 y 9.2.3, y en las versiones de Splunk Cloud Platform anteriores a 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 y 9.1.2308.208, un usuario con privilegios bajos que no tenga los roles de Splunk \\\"admin\\\" o \\\"power\\\" podr\u00eda ejecutar una b\u00fasqueda como el usuario de Splunk \\\"nobody\\\" en la aplicaci\u00f3n SplunkDeploymentServerConfig. Esto podr\u00eda permitir que el usuario con privilegios bajos acceda a datos potencialmente restringidos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"prodsec@splunk.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"prodsec@splunk.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"9.2.0\",\"versionEndExcluding\":\"9.2.3\",\"matchCriteriaId\":\"14D07F5E-504B-447B-988B-BF6ADA59F8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk:9.3.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"11F038B4-1335-4F4E-9013-E6D6152DCD20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.2308.208\",\"matchCriteriaId\":\"557AF53F-284F-43D2-9EA1-2E0E628DC303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.1.2312.100\",\"versionEndExcluding\":\"9.1.2312.110\",\"matchCriteriaId\":\"6DAA9B36-48A2-45BF-97B9-E548E80DF83C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.2.2403.102\",\"versionEndExcluding\":\"9.2.2403.103\",\"matchCriteriaId\":\"200953F8-DF1D-4C6C-BE36-0866700A5F55\"}]}]}],\"references\":[{\"url\":\"https://advisory.splunk.com/advisories/SVD-2024-1002\",\"source\":\"prodsec@splunk.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/\",\"source\":\"prodsec@splunk.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45732\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-15T16:30:27.363227Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*\"], \"vendor\": \"splunk\", \"product\": \"splunk_enterprise\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.3\", \"lessThan\": \"9.3.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.2\", \"lessThan\": \"9.2.3\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*\"], \"vendor\": \"splunk\", \"product\": \"splunk_cloud_platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.2.2403\", \"lessThan\": \"9.2.2403.103\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.1.2312\", \"lessThan\": \"9.1.2312.200\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"9.1.2312.110\"}, {\"status\": \"affected\", \"version\": \"9.1.2308\", \"lessThan\": \"9.1.2308.208\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-15T16:33:58.826Z\"}}], \"cna\": {\"title\": \"Low-privileged user could run search as nobody in SplunkDeploymentServerConfig app\", \"source\": {\"advisory\": \"SVD-2024-1002\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"Anton (therceman)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.1, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Splunk\", \"product\": \"Splunk Enterprise\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.3\", \"lessThan\": \"9.3.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.2\", \"lessThan\": \"9.2.3\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Splunk\", \"product\": \"Splunk Cloud Platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.2.2403\", \"lessThan\": \"9.2.2403.103\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.1.2312\", \"lessThan\": \"9.1.2312.110, 9.1.2312.200\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"9.1.2308\", \"lessThan\": \"9.1.2308.208\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2024-10-14T00:00:00.000Z\", \"references\": [{\"url\": \"https://advisory.splunk.com/advisories/SVD-2024-1002\"}, {\"url\": \"https://research.splunk.com/application/f765c3fe-c3b6-4afe-a932-11dd4f3a024f/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \\\"admin\\\" or \\\"power\\\" Splunk roles could run a search as the \\\"nobody\\\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"In Splunk Enterprise versions below 9.3.1, and 9.2.0 versions below 9.2.3, and Splunk Cloud Platform versions below 9.2.2403.103, 9.1.2312.200, 9.1.2312.110 and 9.1.2308.208, a low-privileged user that does not hold the \\\"admin\\\" or \\\"power\\\" Splunk roles could run a search as the \\\"nobody\\\" Splunk user in the SplunkDeploymentServerConfig app. This could let the low-privileged user access potentially restricted data.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-862\", \"description\": \"The software does not perform an authorization check when an actor attempts to access a resource or perform an action.\"}]}], \"providerMetadata\": {\"orgId\": \"42b59230-ec95-491e-8425-5a5befa1a469\", \"shortName\": \"Splunk\", \"dateUpdated\": \"2025-02-28T11:03:50.807Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-45732\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-28T11:03:50.807Z\", \"dateReserved\": \"2024-09-05T21:35:21.290Z\", \"assignerOrgId\": \"42b59230-ec95-491e-8425-5a5befa1a469\", \"datePublished\": \"2024-10-14T17:03:35.668Z\", \"assignerShortName\": \"Splunk\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…