Vulnerability Details CVE-2024-45735
In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the "admin" or "power" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 3.7%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2024-45735
-
cpe:2.3:a:splunk:splunk:9.1.0
-
cpe:2.3:a:splunk:splunk:9.1.0.1
-
cpe:2.3:a:splunk:splunk:9.1.0.2
-
cpe:2.3:a:splunk:splunk:9.1.1
-
cpe:2.3:a:splunk:splunk:9.1.2
-
cpe:2.3:a:splunk:splunk:9.1.3
-
cpe:2.3:a:splunk:splunk:9.1.4
-
cpe:2.3:a:splunk:splunk:9.1.5
-
cpe:2.3:a:splunk:splunk:9.2.0
-
cpe:2.3:a:splunk:splunk:9.2.1
-
cpe:2.3:a:splunk:splunk:9.2.2
-
cpe:2.3:a:splunk:splunk_cloud_platform:*
-
cpe:2.3:a:splunk:splunk_cloud_platform:-