CVE-2024-22164: The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. in Splunk Splunk Enterprise Security (ES)
In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.
AI Analysis
Technical Summary
CVE-2024-22164 is a medium-severity vulnerability affecting Splunk Enterprise Security (ES) versions 7.1, 7.2, and 7.3. The vulnerability arises from improper control over the allocation and maintenance of a limited resource within the Investigation feature, specifically related to handling investigation attachments. An attacker with at least low-level privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N) by sending oversized requests to the attachment endpoint. Because the endpoint does not properly limit the size of incoming requests, the attacker can cause resource exhaustion, leading to a denial of service (DoS) condition where the Investigation functionality becomes inaccessible. This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the root cause is the failure to properly restrict resource usage, allowing an attacker to consume excessive server resources. The CVSS v3.1 base score is 4.3, reflecting a medium impact primarily on availability, with no direct impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches or mitigations have been linked yet. However, the vulnerability poses a risk to the availability of critical security monitoring and investigation capabilities within Splunk ES, which is widely used for security information and event management (SIEM).
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying heavily on Splunk Enterprise Security for threat detection, incident response, and compliance monitoring. A successful DoS attack on the Investigation feature could disrupt security operations, delaying the identification and mitigation of real threats. This disruption could increase the risk of undetected breaches or prolonged exposure to active threats. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face compliance risks if security monitoring capabilities are impaired. Additionally, the inability to access investigation data could hinder forensic analysis and incident reporting. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact on security tools can indirectly elevate overall organizational risk posture. Given the remote exploitability and lack of user interaction needed, attackers could automate DoS attempts, potentially targeting multiple organizations or critical infrastructure providers simultaneously.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Monitor Splunk ES usage and logs for unusually large or malformed requests to the investigation attachment endpoint, which could indicate exploitation attempts. 2) Implement network-level protections such as rate limiting, web application firewalls (WAFs), or intrusion prevention systems (IPS) to detect and block excessive or anomalous traffic targeting Splunk ES endpoints. 3) Restrict access to the Splunk ES Investigation feature to trusted users and networks, minimizing exposure to untrusted actors. 4) Apply the principle of least privilege by ensuring that only necessary users have permissions to upload or interact with investigation attachments. 5) Stay informed about official patches or updates from Splunk and prioritize timely deployment once available. 6) Consider deploying resource usage monitoring and alerting on Splunk servers to detect early signs of resource exhaustion. 7) If possible, isolate Splunk ES instances in segmented network zones to limit the blast radius of potential DoS attacks. These steps go beyond generic advice by focusing on proactive detection, access control, and network-level defenses tailored to the nature of this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2024-22164: The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. in Splunk Splunk Enterprise Security (ES)
Description
In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.
AI-Powered Analysis
Technical Analysis
CVE-2024-22164 is a medium-severity vulnerability affecting Splunk Enterprise Security (ES) versions 7.1, 7.2, and 7.3. The vulnerability arises from improper control over the allocation and maintenance of a limited resource within the Investigation feature, specifically related to handling investigation attachments. An attacker with at least low-level privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N) by sending oversized requests to the attachment endpoint. Because the endpoint does not properly limit the size of incoming requests, the attacker can cause resource exhaustion, leading to a denial of service (DoS) condition where the Investigation functionality becomes inaccessible. This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the root cause is the failure to properly restrict resource usage, allowing an attacker to consume excessive server resources. The CVSS v3.1 base score is 4.3, reflecting a medium impact primarily on availability, with no direct impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches or mitigations have been linked yet. However, the vulnerability poses a risk to the availability of critical security monitoring and investigation capabilities within Splunk ES, which is widely used for security information and event management (SIEM).
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying heavily on Splunk Enterprise Security for threat detection, incident response, and compliance monitoring. A successful DoS attack on the Investigation feature could disrupt security operations, delaying the identification and mitigation of real threats. This disruption could increase the risk of undetected breaches or prolonged exposure to active threats. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face compliance risks if security monitoring capabilities are impaired. Additionally, the inability to access investigation data could hinder forensic analysis and incident reporting. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact on security tools can indirectly elevate overall organizational risk posture. Given the remote exploitability and lack of user interaction needed, attackers could automate DoS attempts, potentially targeting multiple organizations or critical infrastructure providers simultaneously.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Monitor Splunk ES usage and logs for unusually large or malformed requests to the investigation attachment endpoint, which could indicate exploitation attempts. 2) Implement network-level protections such as rate limiting, web application firewalls (WAFs), or intrusion prevention systems (IPS) to detect and block excessive or anomalous traffic targeting Splunk ES endpoints. 3) Restrict access to the Splunk ES Investigation feature to trusted users and networks, minimizing exposure to untrusted actors. 4) Apply the principle of least privilege by ensuring that only necessary users have permissions to upload or interact with investigation attachments. 5) Stay informed about official patches or updates from Splunk and prioritize timely deployment once available. 6) Consider deploying resource usage monitoring and alerting on Splunk servers to detect early signs of resource exhaustion. 7) If possible, isolate Splunk ES instances in segmented network zones to limit the blast radius of potential DoS attacks. These steps go beyond generic advice by focusing on proactive detection, access control, and network-level defenses tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Splunk
- Date Reserved
- 2024-01-05T16:53:01.503Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6f35
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 7/3/2025, 10:55:25 PM
Last updated: 10/15/2025, 8:26:07 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Africa Remains Top Global Target, Even as Attacks Decline
MediumCVE-2025-61941: Improper limitation of a pathname to a restricted directory ('Path Traversal') in BUFFALO INC. WXR9300BE6P series
HighCVE-2025-11501: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in markomaksym Dynamically Display Posts
HighCVE-2025-55039: CWE-347 Improper Verification of Cryptographic Signature in Apache Software Foundation Apache Spark
UnknownCVE-2025-11161: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in wpbakery WPBakery Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.