Splunk Enterprise Secure Gateway App Improper Access Control Vulnerability
CVE-2024-53243 Published on December 10, 2024
Information Disclosure in Mobile Alert Responses in Splunk Secure Gateway
In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and versions below 3.2.462, 3.7.18, and 3.8.5 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the admin or power Splunk roles could see alert search query responses using Splunk Secure Gateway App Key Value Store (KVstore) collections endpoints due to improper access control.
Weakness Type
What is an Information Disclosure Vulnerability?
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CVE-2024-53243 has been classified to as an Information Disclosure vulnerability or weakness.
Products Associated with CVE-2024-53243
Want to know whenever a new CVE is published for Splunk? stack.watch will email you.
Affected Versions
Splunk Enterprise:- Version 9.3 and below 9.3.2 is affected.
- Version 9.2 and below 9.2.4 is affected.
- Version 9.1 and below 9.1.7 is affected.
- Version 3.8 and below 3.8.5 is affected.
- Version 3.7 and below 3.7.18 is affected.
- Version 3.4 and below 3.4.262 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.