Information Disclosure in Mobile Alert Responses in Splunk Secure Gateway

Advisory ID: SVD-2024-1201

CVE ID: CVE-2024-53243

Published: 2024-12-10

Last Update: 2024-12-10

CVSSv3.1 Score: 4.3, Medium

CWE: CWE-200

Bug ID: VULN-13826

Description

In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 and versions below 3.2.462, 3.7.18, and 3.8.5 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could see alert search query responses using Splunk Secure Gateway App Key Value Store (KVstore) collections endpoints due to improper access control.

Solution

Upgrade Splunk Enterprise to versions 9.3.2, 9.2.4, 9.1.7, or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product Status

ProductVersionComponentAffected VersionFix Version
Splunk Enterprise9.3Splunk Secure Gateway9.3.0 to 9.3.19.3.2
Splunk Enterprise9.2Splunk Secure Gateway9.2.0 to 9.2.39.2.4
Splunk Enterprise9.1Splunk Secure Gateway9.1.0 to 9.1.69.1.7
Splunk Secure Gateway3.83.8.0 to 3.8.43.8.5
Splunk Secure Gateway3.7Below 3.7.183.7.18
Splunk Secure Gateway3.4Below 3.4.2623.4.262

Mitigations and Workarounds

Disable the Splunk Secure Gateway App. See Manage app and add-on objects.

Note: Splunk Mobile, Spacebridge, and Mission Control rely on functionality in $SPLUNK_HOME/etc/apps/splunk_secure_gateway. If you do not use any of the apps, features, or functionality, as a potential mitigation, you may remove or disable the app.

Detections

None

Severity

Splunk rates this vulnerability as a 4.3, Medium, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

If you remove or disable the Splunk Secure Gateway app, there should be no impact and the severity would be informational.

Acknowledgments

Anton (therceman)