The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-23675

CVE-2024-23675: Splunk Cloud Privilege Escalation Flaw

CVE-2024-23675 is a privilege escalation vulnerability in Splunk Cloud affecting KV Store permissions via REST API. Attackers can potentially delete collections. This post covers technical details, affected versions, and mitigations.

Updated: January 22, 2026

CVE-2024-23675 Overview

In Splunk Enterprise versions below 9.0.8 and 9.1.3, the Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This authorization bypass vulnerability can potentially result in the unauthorized deletion of KV Store collections, impacting data integrity across affected Splunk deployments.

Critical Impact

Authenticated users with low privileges can exploit improper permission handling in the REST API to delete KV Store collections, potentially causing significant data loss and operational disruption.

Affected Products

  • Splunk Enterprise versions below 9.0.8
  • Splunk Enterprise versions below 9.1.3
  • Splunk Cloud (specific versions as noted in vendor advisory)

Discovery Timeline

  • 2024-01-22 - CVE-2024-23675 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2024-23675

Vulnerability Analysis

This vulnerability represents an authorization bypass weakness classified under CWE-284 (Improper Access Control) and CWE-863 (Incorrect Authorization). The flaw exists within the Splunk KV Store component, which is designed to store and retrieve application data through a REST API interface.

The core issue lies in how the KV Store validates user permissions when processing REST API requests. Instead of properly enforcing granular access controls, the system fails to adequately verify whether a user has the appropriate privileges to perform destructive operations on KV Store collections. This allows authenticated users with minimal privileges to execute unauthorized deletion operations.

The vulnerability requires network access and low-privilege authentication, meaning an attacker must have valid credentials to the Splunk environment but does not need administrative access to exploit this flaw. The impact is primarily on data integrity, as successful exploitation enables unauthorized deletion of data collections without affecting confidentiality or system availability directly.

Root Cause

The root cause of CVE-2024-23675 is improper authorization validation within the Splunk KV Store REST API endpoints. When processing requests to manage KV Store collections, the application fails to properly check whether the authenticated user possesses sufficient permissions to perform delete operations. This represents a broken access control pattern where the authorization layer does not adequately enforce role-based restrictions on sensitive API endpoints.

Attack Vector

The attack is executed over the network through the Splunk REST API. An attacker with low-privilege credentials can craft API requests targeting KV Store collection endpoints. Due to the improper permission handling, these requests are processed without proper authorization checks, allowing the attacker to delete collections they should not have access to modify.

The attack requires:

  1. Valid authentication credentials to the Splunk environment
  2. Network access to the Splunk REST API
  3. Knowledge of target KV Store collection names

The vulnerability involves sending REST API requests to the KV Store management endpoints. Due to improper permission validation, delete operations are processed without verifying the user's authorization level. For detailed technical information about the attack methodology, refer to the Splunk Security Advisory SVD-2024-0105.

Detection Methods for CVE-2024-23675

Indicators of Compromise

  • Unexpected deletion of KV Store collections, particularly by users who should not have administrative access
  • Audit log entries showing REST API delete operations against KV Store endpoints from non-privileged accounts
  • Reports of missing application data that was previously stored in KV Store collections
  • Unusual patterns of API requests targeting /servicesNS/ or /services/ KV Store endpoints

Detection Strategies

  • Enable and review Splunk internal logs for REST API access patterns targeting KV Store endpoints
  • Implement monitoring rules using the Splunk Research detection content provided by Splunk
  • Configure alerts for deletion operations on KV Store collections performed by non-administrative users
  • Audit user permissions regularly to identify accounts with unexpected access to KV Store management functions

Monitoring Recommendations

  • Deploy SIEM rules to correlate authentication events with subsequent KV Store API operations
  • Establish baseline metrics for normal KV Store management activity and alert on deviations
  • Monitor for bulk deletion patterns or sequential delete requests that may indicate exploitation attempts
  • Review access logs for authentication from unexpected source IP addresses followed by KV Store operations

How to Mitigate CVE-2024-23675

Immediate Actions Required

  • Upgrade Splunk Enterprise to version 9.0.8 or later for the 9.0.x branch
  • Upgrade Splunk Enterprise to version 9.1.3 or later for the 9.1.x branch
  • For Splunk Cloud customers, verify with Splunk support that your environment has been patched
  • Audit current KV Store collection permissions and verify access controls are correctly configured

Patch Information

Splunk has released security updates that address this vulnerability. Organizations should prioritize patching based on their deployment type:

  • Splunk Enterprise 9.0.x: Upgrade to version 9.0.8 or later
  • Splunk Enterprise 9.1.x: Upgrade to version 9.1.3 or later
  • Splunk Cloud: Contact Splunk support or verify patch status through the Splunk Cloud administration interface

Detailed patch information is available in the Splunk Security Advisory SVD-2024-0105.

Workarounds

  • Implement network segmentation to restrict access to the Splunk REST API to authorized networks and users only
  • Review and tighten role-based access controls, ensuring users have minimum required permissions
  • Enable comprehensive audit logging for all REST API operations to facilitate detection of exploitation attempts
  • Consider implementing additional authentication controls such as certificate-based authentication for API access
bash
# Configuration example
# Review current KV Store collection permissions
splunk btool authorize list --debug | grep -i kvstore

# Enable detailed audit logging for REST operations
# Add to server.conf
[httpServer]
logRESTApiCalls = true

# Verify current Splunk version
splunk version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechSplunk

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.09%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-284

  • CWE-863
  • Vendor Resources
  • Splunk Security Advisory SVD-2024-0105

  • Splunk Research Application Analysis
  • Related CVEs
  • CVE-2025-20298: Splunk Universal Forwarder Escalation

  • CVE-2023-40596: Splunk Enterprise Privilege Escalation

  • CVE-2023-32707: Splunk Enterprise Privilege Escalation Flaw

  • CVE-2024-45732: Splunk Privilege Escalation Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English