CVE-2024-45731

8.0 HIGH

📋 TL;DR

This vulnerability allows low-privileged Splunk users without admin or power roles to write files to the Windows system root directory (typically System32) when Splunk Enterprise is installed on a separate drive. This affects Splunk Enterprise for Windows installations below specific patched versions. Attackers could potentially escalate privileges or execute arbitrary code.

💻 Affected Systems

Products:
  • Splunk Enterprise for Windows
Versions: Versions below 9.3.1, 9.2.3, and 9.1.6
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where Splunk Enterprise is installed on a separate drive from the Windows system drive.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could write malicious executables to System32, leading to privilege escalation, persistence mechanisms, or remote code execution with SYSTEM privileges.

🟠

Likely Case

Low-privileged users could write configuration files or scripts to System32, potentially enabling privilege escalation or bypassing security controls.

🟢

If Mitigated

With proper role-based access controls and monitoring, impact is limited to unauthorized file writes that can be detected and remediated.

🌐 Internet-Facing: LOW - This requires authenticated access to Splunk Enterprise, which is typically not internet-facing.
🏢 Internal Only: HIGH - Internal users with low-privileged Splunk accounts could exploit this to gain elevated system access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with any non-admin Splunk role and specific installation configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.3.1, 9.2.3, or 9.1.6

Vendor Advisory: https://advisory.splunk.com/advisories/SVD-2024-1001

Restart Required: Yes

Instructions:

1. Backup Splunk configuration and data. 2. Download appropriate patched version from Splunk website. 3. Run installer with administrative privileges. 4. Restart Splunk services.

🔧 Temporary Workarounds

Restrict Splunk user permissions

windows

Review and minimize Splunk user roles to only necessary permissions

Monitor System32 directory writes

windows

Implement file integrity monitoring on System32 directory

🧯 If You Can't Patch

  • Implement strict role-based access control for Splunk users
  • Deploy endpoint detection and response (EDR) to monitor for suspicious file writes to System32

🔍 How to Verify

Check if Vulnerable:

Check Splunk version via web interface (Settings > Server Info) or command line, and verify installation is on separate drive from Windows system drive.

Check Version:

splunk version

Verify Fix Applied:

Confirm Splunk version is 9.3.1, 9.2.3, or 9.1.6 or higher, and test that low-privileged users cannot write to System32.

📡 Detection & Monitoring

Log Indicators:

  • Splunk audit logs showing file write operations by non-admin users
  • Windows event logs showing file creation in System32 by Splunk processes

SIEM Query:

source="WinEventLog:Security" EventCode=4663 ObjectName="*\System32\*" ProcessName="*splunk*" | stats count by AccountName, ObjectName

🔗 References

📤 Share & Export