Splunk Enterprise and Secure Gateway Remote Code Execution Vulnerability
CVE-2024-53247 Published on December 10, 2024

Remote Code Execution through Deserialization of Untrusted Data in Splunk Secure Gateway app
In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the admin or power Splunk roles could perform a Remote Code Execution (RCE).

NVD

Weakness Type

What is a Marshaling, Unmarshaling Vulnerability?

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVE-2024-53247 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.


Products Associated with CVE-2024-53247

Want to know whenever a new CVE is published for Splunk? stack.watch will email you.

 

Affected Versions

Splunk Enterprise: Splunk Secure Gateway:

Exploit Probability

EPSS
5.76%
Percentile
90.33%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.