{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-23675","assignerOrgId":"42b59230-ec95-491e-8425-5a5befa1a469","state":"PUBLISHED","assignerShortName":"Splunk","dateReserved":"2024-01-19T16:28:17.340Z","datePublished":"2024-01-22T20:37:23.117Z","dateUpdated":"2025-02-28T11:03:59.164Z"},"containers":{"cna":{"affected":[{"product":"Splunk Enterprise","vendor":"Splunk","versions":[{"version":"9.0","status":"affected","versionType":"custom","lessThan":"9.0.8"},{"version":"9.1","status":"affected","versionType":"custom","lessThan":"9.1.3"}]},{"product":"Splunk Cloud","vendor":"Splunk","versions":[{"version":"-","status":"affected","versionType":"custom","lessThan":"9.1.2312.100"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections."}],"value":"In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections."}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2024-0105"},{"url":"https://research.splunk.com/application/8f0e8380-a835-4f2b-b749-9ce119364df0/"}],"title":"Splunk App Key Value Store (KV Store) Improper Handling of Permissions Leads to KV Store Collection Deletion","datePublic":"2024-01-22T00:00:00.000Z","metrics":[{"cvssV3_1":{"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","version":"3.1","baseScore":6.5,"baseSeverity":"MEDIUM"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"cwe","description":"The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.","cweId":"CWE-284"}]}],"source":{"advisory":"SVD-2024-0105"},"credits":[{"lang":"en","value":"Julian Kaufmann"}],"providerMetadata":{"orgId":"42b59230-ec95-491e-8425-5a5befa1a469","shortName":"Splunk","dateUpdated":"2025-02-28T11:03:59.164Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T23:06:25.378Z"},"title":"CVE Program Container","references":[{"url":"https://advisory.splunk.com/advisories/SVD-2024-0105","tags":["x_transferred"]},{"url":"https://research.splunk.com/application/8f0e8380-a835-4f2b-b749-9ce119364df0/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-01-23T18:20:30.290043Z","id":"CVE-2024-23675","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-21T10:41:48.690Z"}}]}}