CVE-2023-30969

8.2 HIGH

📋 TL;DR

CVE-2023-30969 is an authentication/authorization bypass vulnerability in Palantir Tiles1 service where API endpoints lack proper access controls. This allows unauthenticated attackers to access sensitive functionality and data. Organizations using Palantir Tiles1 service are affected.

💻 Affected Systems

Products:
  • Palantir Tiles1 service
Versions: Specific versions not publicly disclosed in references; likely multiple versions prior to patch
Operating Systems: All platforms running Palantir Tiles1
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of the affected Tiles1 service are vulnerable unless specifically patched or workarounds applied.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Tiles1 service allowing unauthorized access to all data and functionality, potentially leading to data exfiltration, service disruption, or privilege escalation.

🟠

Likely Case

Unauthorized access to sensitive data and functionality through API endpoints, potentially exposing confidential information or allowing unauthorized operations.

🟢

If Mitigated

Limited impact if proper network segmentation and additional authentication layers are in place, though the core vulnerability remains.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable without authentication, exposing the service to widespread attack.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or compromised internal systems, though attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Simple API calls without authentication required

The vulnerability is straightforward to exploit by accessing unprotected API endpoints directly.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific version not publicly disclosed; consult Palantir support

Vendor Advisory: https://palantir.safebase.us/?tcuUid=afcbc9b2-de62-44b9-b28b-2ebf0684fbf7

Restart Required: Yes

Instructions:

1. Contact Palantir support for specific patch version. 2. Apply the security update to all Tiles1 instances. 3. Restart the Tiles1 service. 4. Verify authentication is enforced on all endpoints.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to Tiles1 service endpoints using firewall rules

API Gateway Authentication

all

Place Tiles1 behind an API gateway that enforces authentication before requests reach the service

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Tiles1 service from untrusted networks
  • Deploy a reverse proxy with authentication in front of Tiles1 to enforce access controls

🔍 How to Verify

Check if Vulnerable:

Test API endpoints without authentication; if endpoints respond with data or functionality, the system is vulnerable.

Check Version:

Consult Palantir documentation or contact support for version checking commands specific to Tiles1 deployment.

Verify Fix Applied:

After patching, test API endpoints without authentication; all should return authentication errors or be inaccessible.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests to Tiles1 endpoints
  • Access patterns showing requests without authentication headers

Network Indicators:

  • Unusual API traffic patterns from unauthorized sources
  • Direct API calls without authentication tokens

SIEM Query:

source="tiles1" AND (NOT auth_token_present OR auth_failure=false) AND http_status=200

🔗 References

📤 Share & Export