Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-30971: This weakness has been deprecated because it covered redundant concepts already described in CWE-287. in Palantir com.palantir.acme.gaia:gaia

0
Medium
VulnerabilityCVE-2023-30971cvecve-2023-30971cwe-287
Published: Fri Dec 19 2025 (12/19/2025, 16:34:19 UTC)
Source: CVE Database V5
Vendor/Project: Palantir
Product: com.palantir.acme.gaia:gaia

Description

Gotham Gaia application was found to be exposing multiple unauthenticated endpoints.

AI-Powered Analysis

AILast updated: 12/19/2025, 16:49:36 UTC

Technical Analysis

CVE-2023-30971 identifies a vulnerability in Palantir's Gotham Gaia application (com.palantir.acme.gaia:gaia) where multiple endpoints are exposed without proper authentication, violating CWE-287 (Improper Authentication). This allows attackers with network access to potentially access sensitive application functions or data without valid credentials. The CVSS 3.1 vector (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) indicates that the attack is network-based, requires high attack complexity, low privileges, and no user interaction, with impacts on confidentiality and integrity but not availability. The vulnerability was reserved in April 2023 and published in December 2025, but no patches or known exploits have been reported. The weakness was deprecated as it overlaps with CWE-287 concepts, but the practical risk remains due to exposed unauthenticated endpoints. The lack of authentication could allow unauthorized data access or manipulation, posing risks especially in environments where Gotham Gaia is used for critical data analytics or decision-making. The absence of patches necessitates compensating controls to mitigate risk.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure and modification of sensitive data processed by Gotham Gaia, undermining confidentiality and integrity. Given Palantir's use in government, defense, and critical infrastructure sectors in Europe, exploitation could compromise strategic data or analytics, affecting decision-making and operational security. The medium severity score reflects the high complexity required for exploitation and limited privileges needed, but the lack of user interaction lowers barriers for attackers with network access. Organizations with exposed Gotham Gaia endpoints risk data breaches, espionage, or sabotage. The impact is heightened in sectors with strict data protection regulations like GDPR, where unauthorized data access could lead to regulatory penalties and reputational damage.

Mitigation Recommendations

European organizations should immediately audit network exposure of Gotham Gaia endpoints and restrict access using network segmentation and firewalls to trusted IP ranges only. Implement strong access control mechanisms, including multi-factor authentication where possible, even if the application lacks native support. Monitor logs and network traffic for unusual access patterns or attempts to reach unauthenticated endpoints. Employ application-layer gateways or reverse proxies to enforce authentication and authorization policies externally. Engage with Palantir support to obtain guidance on patches or updates, and apply any available security updates promptly. Conduct regular security assessments and penetration tests focused on authentication bypass scenarios. Finally, ensure incident response plans include scenarios for unauthorized access to analytics platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Palantir
Date Reserved
2023-04-21T11:42:33.501Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69458083f063e4fadff5e827

Added to database: 12/19/2025, 4:42:43 PM

Last enriched: 12/19/2025, 4:49:36 PM

Last updated: 12/19/2025, 7:26:47 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats