Wiz Agents & Workflows are here

CVE-2024-53247
Splunk Enterprise vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2024-53247) has been identified in Splunk Enterprise and Splunk Secure Gateway app, affecting versions below 9.3.2, 9.2.4, and 9.1.7 of Splunk Enterprise, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform. The vulnerability allows low-privileged users without 'admin' or 'power' roles to perform Remote Code Execution (RCE). This security flaw was discovered and disclosed on December 10, 2024 (Splunk Advisory).

Technical details

The vulnerability stems from an unsafe deserialization of data due to an insecure usage of the jsonpickle Python library, classified as CWE-502 (Deserialization of Untrusted Data). The severity of this vulnerability has been rated with a CVSS v3.1 base score of 8.8 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (Splunk Advisory, Security Online).

Impact

Successful exploitation of this vulnerability could lead to complete system compromise, allowing attackers to compromise sensitive data, install malware, take control of the system, and disrupt critical services. The vulnerability affects both on-premises Splunk Enterprise installations and cloud-based deployments through the Splunk Secure Gateway app (Security Online).

Mitigation and workarounds

Splunk has released patches to address this vulnerability. Users are advised to upgrade Splunk Enterprise to versions 9.3.2, 9.2.4, or 9.1.7 or higher, and the Splunk Secure Gateway app to versions 3.4.261 or 3.7.13 or higher. As a temporary mitigation, if immediate patching is not possible, users can disable the Splunk Secure Gateway app, though this will also disable Splunk Mobile, Spacebridge, and Mission Control functionality (Splunk Advisory, ASEC).

Additional resources


SourceThis report was generated using AI

Related Splunk Enterprise vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-20163HIGH7.2
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesMar 11, 2026
CVE-2026-20165MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesMar 11, 2026
CVE-2026-20164MEDIUM6.5
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesMar 11, 2026
CVE-2026-20162MEDIUM6.3
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesMar 11, 2026
CVE-2026-20166MEDIUM5.4
  • Splunk EnterpriseSplunk Enterprise
  • cpe:2.3:a:splunk:splunk
NoYesMar 11, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management