CVE-2023-48365

9.6 CRITICAL

📋 TL;DR

CVE-2023-48365 is an unauthenticated remote code execution vulnerability in Qlik Sense Enterprise for Windows. Attackers can exploit improper HTTP header validation to tunnel requests and execute arbitrary code on backend repository servers. Organizations running affected Qlik Sense versions without patches are vulnerable.

💻 Affected Systems

Products:
  • Qlik Sense Enterprise for Windows
Versions: All versions before August 2023 Patch 2, specifically excluding: August 2023 Patch 2, May 2023 Patch 6, February 2023 Patch 10, November 2022 Patch 12, August 2022 Patch 14, May 2022 Patch 16, February 2022 Patch 15, November 2021 Patch 17
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability exists due to incomplete fix for CVE-2023-41265. Only affects Windows versions of Qlik Sense Enterprise.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Initial access leading to data exfiltration, ransomware deployment, or use as a foothold for lateral movement within the network.

🟢

If Mitigated

Attack blocked at network perimeter or detected before significant damage occurs.

🌐 Internet-Facing: HIGH - Unauthenticated RCE with CVSS 9.6 and known exploitation makes internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to network-accessible attackers, including compromised internal devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: August 2023 Patch 2 or later security patches listed in affected versions

Vendor Advisory: https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2120510

Restart Required: Yes

Instructions:

1. Download appropriate patch from Qlik Support Portal. 2. Backup Qlik Sense environment. 3. Apply patch following Qlik's installation guide. 4. Restart Qlik Sense services. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Qlik Sense servers to only trusted IP addresses and required users

Use firewall rules to limit inbound connections to Qlik Sense ports (typically 443, 4242, 4244)

Web Application Firewall

all

Deploy WAF with rules to detect and block HTTP header manipulation attacks

Configure WAF rules to inspect and validate HTTP headers for anomalies

🧯 If You Can't Patch

  • Isolate Qlik Sense servers in separate network segment with strict access controls
  • Implement intrusion detection/prevention systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Qlik Sense version via Qlik Management Console (QMC) or registry: HKEY_LOCAL_MACHINE\SOFTWARE\QlikTech\Sense\Version

Check Version:

reg query "HKLM\SOFTWARE\QlikTech\Sense" /v Version

Verify Fix Applied:

Verify installed version matches or exceeds patched versions listed in affected systems

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests with manipulated headers to repository service
  • Unexpected process creation from Qlik Sense services
  • Authentication bypass attempts

Network Indicators:

  • HTTP requests with abnormal header patterns to Qlik Sense ports
  • Unusual outbound connections from Qlik Sense servers

SIEM Query:

source="qlik-sense-logs" AND (http_header_manipulation OR authentication_bypass OR "repository service" AND suspicious_request)

🔗 References

📤 Share & Export