CVE-2024-22164: The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. in Splunk Splunk Enterprise Security (ES)
In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.
AI Analysis
Technical Summary
CVE-2024-22164 is a medium-severity vulnerability affecting Splunk Enterprise Security (ES) versions 7.1, 7.2, and 7.3. The vulnerability arises from improper control over the allocation and maintenance of a limited resource within the Investigation feature, specifically related to handling investigation attachments. An attacker with at least low-level privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N) by sending oversized requests to the attachment endpoint. Because the endpoint does not properly limit the size of incoming requests, the attacker can cause resource exhaustion, leading to a denial of service (DoS) condition where the Investigation functionality becomes inaccessible. This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the root cause is the failure to properly restrict resource usage, allowing an attacker to consume excessive server resources. The CVSS v3.1 base score is 4.3, reflecting a medium impact primarily on availability, with no direct impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches or mitigations have been linked yet. However, the vulnerability poses a risk to the availability of critical security monitoring and investigation capabilities within Splunk ES, which is widely used for security information and event management (SIEM).
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying heavily on Splunk Enterprise Security for threat detection, incident response, and compliance monitoring. A successful DoS attack on the Investigation feature could disrupt security operations, delaying the identification and mitigation of real threats. This disruption could increase the risk of undetected breaches or prolonged exposure to active threats. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face compliance risks if security monitoring capabilities are impaired. Additionally, the inability to access investigation data could hinder forensic analysis and incident reporting. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact on security tools can indirectly elevate overall organizational risk posture. Given the remote exploitability and lack of user interaction needed, attackers could automate DoS attempts, potentially targeting multiple organizations or critical infrastructure providers simultaneously.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Monitor Splunk ES usage and logs for unusually large or malformed requests to the investigation attachment endpoint, which could indicate exploitation attempts. 2) Implement network-level protections such as rate limiting, web application firewalls (WAFs), or intrusion prevention systems (IPS) to detect and block excessive or anomalous traffic targeting Splunk ES endpoints. 3) Restrict access to the Splunk ES Investigation feature to trusted users and networks, minimizing exposure to untrusted actors. 4) Apply the principle of least privilege by ensuring that only necessary users have permissions to upload or interact with investigation attachments. 5) Stay informed about official patches or updates from Splunk and prioritize timely deployment once available. 6) Consider deploying resource usage monitoring and alerting on Splunk servers to detect early signs of resource exhaustion. 7) If possible, isolate Splunk ES instances in segmented network zones to limit the blast radius of potential DoS attacks. These steps go beyond generic advice by focusing on proactive detection, access control, and network-level defenses tailored to the nature of this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2024-22164: The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. in Splunk Splunk Enterprise Security (ES)
Description
In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.
AI-Powered Analysis
Technical Analysis
CVE-2024-22164 is a medium-severity vulnerability affecting Splunk Enterprise Security (ES) versions 7.1, 7.2, and 7.3. The vulnerability arises from improper control over the allocation and maintenance of a limited resource within the Investigation feature, specifically related to handling investigation attachments. An attacker with at least low-level privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N) by sending oversized requests to the attachment endpoint. Because the endpoint does not properly limit the size of incoming requests, the attacker can cause resource exhaustion, leading to a denial of service (DoS) condition where the Investigation functionality becomes inaccessible. This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the root cause is the failure to properly restrict resource usage, allowing an attacker to consume excessive server resources. The CVSS v3.1 base score is 4.3, reflecting a medium impact primarily on availability, with no direct impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches or mitigations have been linked yet. However, the vulnerability poses a risk to the availability of critical security monitoring and investigation capabilities within Splunk ES, which is widely used for security information and event management (SIEM).
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying heavily on Splunk Enterprise Security for threat detection, incident response, and compliance monitoring. A successful DoS attack on the Investigation feature could disrupt security operations, delaying the identification and mitigation of real threats. This disruption could increase the risk of undetected breaches or prolonged exposure to active threats. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face compliance risks if security monitoring capabilities are impaired. Additionally, the inability to access investigation data could hinder forensic analysis and incident reporting. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact on security tools can indirectly elevate overall organizational risk posture. Given the remote exploitability and lack of user interaction needed, attackers could automate DoS attempts, potentially targeting multiple organizations or critical infrastructure providers simultaneously.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Monitor Splunk ES usage and logs for unusually large or malformed requests to the investigation attachment endpoint, which could indicate exploitation attempts. 2) Implement network-level protections such as rate limiting, web application firewalls (WAFs), or intrusion prevention systems (IPS) to detect and block excessive or anomalous traffic targeting Splunk ES endpoints. 3) Restrict access to the Splunk ES Investigation feature to trusted users and networks, minimizing exposure to untrusted actors. 4) Apply the principle of least privilege by ensuring that only necessary users have permissions to upload or interact with investigation attachments. 5) Stay informed about official patches or updates from Splunk and prioritize timely deployment once available. 6) Consider deploying resource usage monitoring and alerting on Splunk servers to detect early signs of resource exhaustion. 7) If possible, isolate Splunk ES instances in segmented network zones to limit the blast radius of potential DoS attacks. These steps go beyond generic advice by focusing on proactive detection, access control, and network-level defenses tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Splunk
- Date Reserved
- 2024-01-05T16:53:01.503Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6f35
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 7/3/2025, 10:55:25 PM
Last updated: 7/26/2025, 3:02:51 PM
Views: 13
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.