Splunk has released critical security patches for Splunk Enterprise, addressing 11 vulnerabilities, including two high-severity bugs that can lead to remote code execution on Windows systems. The most severe vulnerability, CVE-2024-45733, is an insecure session storage configuration issue that allows a user without 'admin' or 'power' Splunk roles to execute code remotely. This vulnerability affects only instances running on Windows machines and can be resolved by updating to Splunk Enterprise versions 9.2.3, 9.1.6, or 9.3.1. The second high-severity bug, CVE-2024-45731, is an arbitrary file write defect that can lead to remote code execution. This vulnerability allows a user without 'admin' or 'power' Splunk roles to write a malicious DLL to the Windows system root directory, which can result in remote execution of the code within that DLL. Splunk Enterprise instances that are not installed on a separate disk are not affected by this bug. Patches for this vulnerability are included in Splunk Enterprise versions 9.2.3, 9.1.6, and 9.3.1. In addition to these high-severity vulnerabilities, Splunk has also addressed dozens of vulnerabilities in third-party packages used in the product, as well as eight medium-severity flaws that can lead to the execution of JavaScript code, exposure of plaintext passwords, and unauthorized modifications to settings. Furthermore, a high-severity information disclosure flaw, CVE-2024-45732, has been addressed, which could allow a low-privileged user to run a search as the 'nobody' Splunk role and access potentially restricted data. Splunk has released detections for most of these vulnerabilities, and additional information can be found on the company's security advisories page. It is essential for Splunk Enterprise users to update to the latest versions to ensure the security and integrity of their systems.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...