CVE-2024-45731

Published at:
2024-10-14T17:15:11.177

Global infos:

In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive.

CVE Status: Analyzed

References:

  • [email protected]
  • [email protected]
  • Metrics:

    AttributeValue
    Attack ComplexityHIGH
    Attack VectorNETWORK
    Availability ImpactHIGH
    Base Score8
    Base SeverityHIGH
    Confidentiality ImpactHIGH
    Integrity ImpactHIGH
    Privileges RequiredLOW
    ScopeCHANGED
    User InteractionREQUIRED
    Vector StringCVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
    Exploitability Score1.3
    Impact Score6
    Source[email protected]
    TypeSecondary

    Links:

    Exploit-db
    Github