CVE-2024-3330

9.9 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code in Spotfire products. It affects Spotfire Analyst (Windows client requiring user interaction), Spotfire Web Player (runs as service account), and Spotfire Automation Services. The vulnerability impacts multiple versions across Spotfire 12.x and 14.x.

💻 Affected Systems

Products:
  • Spotfire Analyst
  • Spotfire Server
  • Spotfire for AWS Marketplace
Versions: Spotfire Analyst: 12.0.9-12.5.0, 14.0-14.0.2; Spotfire Server: 12.0.10-12.5.0, 14.0-14.0.3, 14.2.0-14.3.0; Spotfire for AWS Marketplace: 14.0-14.3.0
Operating Systems: Windows for Analyst client, Multiple for server components
Default Config Vulnerable: ⚠️ Yes
Notes: Web Player and Automation Services are particularly vulnerable as they run with service account privileges and may be internet-facing.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over affected systems, potentially leading to data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Attacker gains code execution with the privileges of the running process (user account for Analyst, service account for Web Player/Automation Services), enabling data access and further exploitation.

🟢

If Mitigated

With proper network segmentation and least privilege, impact limited to isolated segments with minimal critical data exposure.

🌐 Internet-Facing: HIGH for Web Player and Automation Services exposed to internet, as they allow unauthenticated exploitation leading to service account compromise.
🏢 Internal Only: HIGH for all affected components due to potential lateral movement and privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction for Analyst client but is unauthenticated for Web Player and Automation Services. The high CVSS score suggests relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Spotfire Analyst: 12.5.1 or 14.0.3; Spotfire Server: 12.5.1, 14.0.4, or 14.3.1; Spotfire for AWS Marketplace: 14.3.1

Vendor Advisory: https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-june-262024-spotfire-cve-2024-3330-r3435/

Restart Required: Yes

Instructions:

1. Download patches from TIBCO support portal. 2. Apply patches to affected components. 3. Restart services. 4. Verify version updates.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Spotfire components from internet and restrict internal network access

Service Account Hardening

all

Run Web Player and Automation Services with minimal privileges

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and restrict network access
  • Implement application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check Spotfire version against affected ranges. For Analyst: Help > About. For Server: Admin console or installation logs.

Check Version:

Spotfire Analyst: Check Help > About dialog. Spotfire Server: Check admin console or installation directory version files.

Verify Fix Applied:

Verify version is updated to patched versions: Analyst 12.5.1+, 14.0.3+; Server 12.5.1+, 14.0.4+, 14.3.1+; AWS Marketplace 14.3.1+.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from Spotfire components
  • Suspicious network connections from Spotfire services
  • Authentication anomalies

Network Indicators:

  • Unexpected outbound connections from Spotfire servers
  • Traffic to known malicious IPs from Spotfire components

SIEM Query:

source="spotfire*" AND (event_type="process_creation" OR event_type="network_connection") AND (process_name NOT IN allowed_processes OR dest_ip NOT IN allowed_ips)

🔗 References

📤 Share & Export