CVE Alert: CVE-2024-45731
Vulnerability Summary: CVE-2024-45731
In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the “admin” or “power” Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive.
Affected Endpoints:
No affected endpoints listed.
Published Date:
10/14/2024, 5:15:11 PM
🔥 CVSS Score:
Exploit Status:
Not ExploitedReferences:
- https://advisory.splunk.com/advisories/SVD-2024-1001
- https://research.splunk.com/application/c97e0704-d9c6-454d-89ba-1510a987bf72/
Recommended Action:
No proposed action available. Please refer to vendor documentation for updates.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.