Skip to main content

CVE-2024-22164: The software does not properly control the allocation and maintenance of a limited resource thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. in Splunk Splunk Enterprise Security (ES)

Medium
VulnerabilityCVE-2024-22164cvecve-2024-22164
Published: Tue Jan 09 2024 (01/09/2024, 17:01:07 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise Security (ES)

Description

In Splunk Enterprise Security (ES) versions below 7.1.2, an attacker can use investigation attachments to perform a denial of service (DoS) to the Investigation. The attachment endpoint does not properly limit the size of the request which lets an attacker cause the Investigation to become inaccessible.

AI-Powered Analysis

AILast updated: 07/03/2025, 22:55:25 UTC

Technical Analysis

CVE-2024-22164 is a medium-severity vulnerability affecting Splunk Enterprise Security (ES) versions 7.1, 7.2, and 7.3. The vulnerability arises from improper control over the allocation and maintenance of a limited resource within the Investigation feature, specifically related to handling investigation attachments. An attacker with at least low-level privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N) by sending oversized requests to the attachment endpoint. Because the endpoint does not properly limit the size of incoming requests, the attacker can cause resource exhaustion, leading to a denial of service (DoS) condition where the Investigation functionality becomes inaccessible. This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the root cause is the failure to properly restrict resource usage, allowing an attacker to consume excessive server resources. The CVSS v3.1 base score is 4.3, reflecting a medium impact primarily on availability, with no direct impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches or mitigations have been linked yet. However, the vulnerability poses a risk to the availability of critical security monitoring and investigation capabilities within Splunk ES, which is widely used for security information and event management (SIEM).

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those relying heavily on Splunk Enterprise Security for threat detection, incident response, and compliance monitoring. A successful DoS attack on the Investigation feature could disrupt security operations, delaying the identification and mitigation of real threats. This disruption could increase the risk of undetected breaches or prolonged exposure to active threats. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face compliance risks if security monitoring capabilities are impaired. Additionally, the inability to access investigation data could hinder forensic analysis and incident reporting. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact on security tools can indirectly elevate overall organizational risk posture. Given the remote exploitability and lack of user interaction needed, attackers could automate DoS attempts, potentially targeting multiple organizations or critical infrastructure providers simultaneously.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Monitor Splunk ES usage and logs for unusually large or malformed requests to the investigation attachment endpoint, which could indicate exploitation attempts. 2) Implement network-level protections such as rate limiting, web application firewalls (WAFs), or intrusion prevention systems (IPS) to detect and block excessive or anomalous traffic targeting Splunk ES endpoints. 3) Restrict access to the Splunk ES Investigation feature to trusted users and networks, minimizing exposure to untrusted actors. 4) Apply the principle of least privilege by ensuring that only necessary users have permissions to upload or interact with investigation attachments. 5) Stay informed about official patches or updates from Splunk and prioritize timely deployment once available. 6) Consider deploying resource usage monitoring and alerting on Splunk servers to detect early signs of resource exhaustion. 7) If possible, isolate Splunk ES instances in segmented network zones to limit the blast radius of potential DoS attacks. These steps go beyond generic advice by focusing on proactive detection, access control, and network-level defenses tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Splunk
Date Reserved
2024-01-05T16:53:01.503Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6f35

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/3/2025, 10:55:25 PM

Last updated: 7/26/2025, 3:02:51 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats