Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Splunk Patches Critical RCE Flaws

July 3, 2024
Reading Time: 3 mins read
in Alerts
Splunk Patches Critical RCE Flaws

In a significant move to bolster security, Splunk has released a series of critical updates for its Enterprise platform. These updates address multiple vulnerabilities that pose severe risks to the security of systems running affected versions of Splunk Enterprise. Following its acquisition by Cisco in 2024, Splunk is emphasizing the importance of digital resilience across its customer base. The recent vulnerabilities, discovered by both internal and external security researchers, could allow attackers to execute arbitrary code remotely, making these updates crucial for maintaining system integrity.

The vulnerabilities affect Splunk Enterprise versions 9.0.x, 9.1.x, and 9.2.x, with some of the most critical issues identified including CVE-2024-36984, CVE-2024-36985, and CVE-2024-36983. CVE-2024-36984, for instance, allows an authenticated user to execute arbitrary code through serialized session payloads by exploiting the collect SPL command. Another severe flaw, CVE-2024-36985, permits a low-privileged user to cause remote code execution via an external lookup that references the splunk_archiver application. These vulnerabilities underscore the potential for significant security breaches if not promptly addressed.

In response, Splunk has released updates to mitigate these risks, urging users to upgrade to versions 9.0.10, 9.1.5, or 9.2.2. The company has noted that Splunk Cloud Platform instances are also being patched and monitored to ensure comprehensive protection across all deployments. The urgency of these updates cannot be overstated, as the vulnerabilities include remote code execution and command injection capabilities that could be exploited by attackers to gain unauthorized access and control over affected systems.

Additionally, the updates address several cross-site scripting (XSS) vulnerabilities and a critical flaw involving a null pointer reference on the cluster/config REST endpoint, which could cause a crash of the Splunk daemon. Organizations using affected versions of Splunk Enterprise are strongly advised to prioritize these updates to mitigate the risk of exploitation. Promptly applying these security patches is essential for safeguarding sensitive data and maintaining the overall security posture of enterprise environments. By addressing these vulnerabilities swiftly, organizations can protect themselves against potential threats and ensure the continued reliability and security of their Splunk deployments.

Reference:

  • Critical Splunk Enterprise Vulnerabilities Patched to Prevent Remote Code Execution
Tags: CiscoCyber AlertsCyber Alerts 2024Cyber RiskCyber threatJuly 2024SPLSplunkSplunk EnterpriseVulnerabilities
ADVERTISEMENT

Related Posts

Chrome Extensions Leak Data And API Keys

Chrome Extensions Leak Data And API Keys

June 6, 2025
Chrome Extensions Leak Data And API Keys

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

June 6, 2025
UNC6040 Vishing Group Target Salesforce Data

UNC6040 Vishing Group Target Salesforce Data

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

New Chaos RAT Variant Hits Windows and Linux

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

FBI Warns Hedera NFT Airdrop Crypto Scam

June 5, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial