Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23169: n/a

0
Medium
VulnerabilityCVE-2024-23169cvecve-2024-23169
Published: Fri Nov 15 2024 (11/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The web interface in RSA NetWitness 11.7.2.0 allows Cross-Site Scripting (XSS) via the Where textbox on the Reports screen during new rule creation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:14:15 UTC

Technical Analysis

CVE-2024-23169 is a Cross-Site Scripting (XSS) vulnerability identified in the RSA NetWitness platform, specifically version 11.7.2.0. The vulnerability arises from insufficient input sanitization in the 'Where' textbox on the Reports screen when creating new rules. An authenticated user with privileges to create or modify rules can inject malicious JavaScript code into this input field. When the crafted input is rendered in the web interface, the malicious script executes in the context of the victim's browser session. This can lead to limited confidentiality impact by potentially stealing session tokens or other sensitive information accessible via the browser. The vulnerability requires low attack complexity but does require privileges (PR:L) and user interaction (UI:R) to trigger. The CVSS 3.1 base score is 4.6, reflecting a medium severity rating. The attack vector is network-based (AV:N), and the scope remains unchanged (S:U). There are no known public exploits or patches available at the time of publication. The underlying weakness corresponds to CWE-79, which is a common web application security flaw related to improper neutralization of input leading to XSS. This vulnerability could be leveraged by malicious insiders or attackers who have gained limited access to the RSA NetWitness interface to execute scripts that may hijack sessions or perform actions on behalf of the user.

Potential Impact

The primary impact of CVE-2024-23169 is on confidentiality, with a limited potential to expose session tokens or sensitive browser data through script execution. The integrity of the system is not directly compromised, and availability impact is minimal but possible if malicious scripts disrupt the web interface. Since exploitation requires authenticated access and user interaction, the risk is somewhat contained but still significant in environments where multiple users have access to RSA NetWitness. Successful exploitation could facilitate further attacks such as session hijacking or phishing within the context of the RSA NetWitness management console. Organizations relying on RSA NetWitness for critical network monitoring and incident response could face operational disruptions or data exposure if this vulnerability is exploited. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for timely mitigation.

Mitigation Recommendations

To mitigate CVE-2024-23169, organizations should first restrict access to the RSA NetWitness web interface to trusted and authenticated users only, minimizing the attack surface. Implement strict role-based access controls (RBAC) to limit who can create or modify rules, especially those involving the Reports screen. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the 'Where' textbox input. Monitor logs for unusual activity related to rule creation or modification. Since no official patch is currently available, consider applying input validation and sanitization at the proxy or gateway level if possible. Educate users with access about the risks of clicking suspicious links or executing untrusted scripts within the RSA NetWitness interface. Regularly check for updates or patches from RSA and apply them promptly once released. Conduct internal penetration testing focusing on web interface inputs to identify similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d51b7ef31ef0b5704d5

Added to database: 2/25/2026, 9:44:49 PM

Last enriched: 2/26/2026, 10:14:15 AM

Last updated: 4/12/2026, 2:00:16 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses