Skip to content

Commit

Permalink
Format markdown files
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Jan 24, 2024
1 parent 3772679 commit bb5a8a5
Showing 1 changed file with 25 additions and 30 deletions.
55 changes: 25 additions & 30 deletions docs/advisories/20240124001-Splunk-Enterprise-Windows-patch.md
Original file line number Diff line number Diff line change
@@ -1,30 +1,25 @@
# Splunk Enterprise Patches High-Severity Vulnerability - 20240124001


## Overview

Splunk has released information about a High severity vulnerability affecting Splunk Enterprise for Windows.


## What is vulnerable?

| CVE ID | Product(s) Affected | Summary | Severity | CVSS |
| --------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ---- | ---|
| [CVE-2024-23678](https://nvd.nist.gov/vuln/detail/CVE-2024-23678) | Splunk Enterprise for Windows **versions below** 9.0.8 and 9.1.3 | Splunk Enterprise for Windows does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows. | **High** | 7.5 |


## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.


## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)):

- https://advisory.splunk.com/advisories/SVD-2024-0108


## Additional References

- SecurityWeek: https://www.securityweek.com/high-severity-vulnerability-patched-in-splunk-enterprise/
# Splunk Enterprise Patches High-Severity Vulnerability - 20240124001

## Overview

Splunk has released information about a High severity vulnerability affecting Splunk Enterprise for Windows.

## What is vulnerable?

| CVE ID | Product(s) Affected | Summary | Severity | CVSS |
| ----------------------------------------------------------------- | ---------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------- | ---- |
| [CVE-2024-23678](https://nvd.nist.gov/vuln/detail/CVE-2024-23678) | Splunk Enterprise for Windows **versions below** 9.0.8 and 9.1.3 | Splunk Enterprise for Windows does not correctly sanitize path input data. This results in the unsafe deserialization of untrusted data from a separate disk partition on the machine. This vulnerability only affects Splunk Enterprise for Windows. | **High** | 7.5 |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)):

- https://advisory.splunk.com/advisories/SVD-2024-0108

## Additional References

- SecurityWeek: https://www.securityweek.com/high-severity-vulnerability-patched-in-splunk-enterprise/

0 comments on commit bb5a8a5

Please sign in to comment.