CVE-2024-29945: Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level.
AI Analysis
Technical Summary
CVE-2024-29945 is a vulnerability affecting Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, where sensitive authentication tokens can be inadvertently logged during the token validation process. This exposure arises specifically when Splunk Enterprise is running in debug mode or when the JsonWebToken component is configured to log at the DEBUG level. Under these conditions, authentication tokens, which are critical for user session validation and access control, may be written to log files. These logs could then be accessed by attackers who have gained access to the system or logs, providing them with valuable credentials to impersonate users or escalate privileges. The vulnerability requires that either debug mode is enabled or debug-level logging is configured, which typically requires administrative privileges, limiting the ease of exploitation. However, if exploited, the confidentiality, integrity, and availability of the system are all at high risk, as attackers could use the exposed tokens to bypass authentication and manipulate or disrupt Splunk services. No public exploits have been reported yet, but the vulnerability has been assigned a CVSS v3.1 score of 7.2, indicating a high severity. The issue was publicly disclosed on March 27, 2024, and affects multiple recent versions of Splunk Enterprise, a widely used platform for security information and event management (SIEM).
Potential Impact
For European organizations, the exposure of authentication tokens in Splunk Enterprise logs can lead to severe security breaches. Attackers who obtain these tokens could impersonate legitimate users, including administrators, leading to unauthorized access to sensitive data and systems. This can compromise the confidentiality of sensitive information, the integrity of log and event data, and the availability of Splunk services critical for security monitoring and incident response. Organizations in sectors such as finance, healthcare, energy, and government, which rely heavily on Splunk for security analytics, could face regulatory penalties under GDPR if personal data is exposed. The breach of authentication tokens also increases the risk of lateral movement within networks, potentially leading to broader compromises. Given Splunk's role in security operations, disruption or manipulation of its data can delay detection and response to other cyber threats, amplifying overall risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Splunk Enterprise to versions 9.2.1, 9.1.4, or 9.0.9 or later, where the issue is resolved. Until upgrades can be applied, disable debug mode and avoid setting the JsonWebToken component to DEBUG logging level to prevent sensitive token information from being logged. Access to log files should be strictly controlled and monitored, ensuring only authorized personnel can view or modify them. Implement robust logging and monitoring to detect any unauthorized changes to logging configurations or unexpected debug logging activity. Regularly audit Splunk configurations and logs for signs of token exposure or misuse. Additionally, enforce strong access controls and multi-factor authentication for administrative access to Splunk systems to reduce the risk of attackers enabling debug logging. Finally, review and rotate authentication tokens and credentials if exposure is suspected.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2024-29945: Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the software potentially exposes authentication tokens during the token validation process. This exposure happens when either Splunk Enterprise runs in debug mode or the JsonWebToken component has been configured to log its activity at the DEBUG logging level.
AI-Powered Analysis
Technical Analysis
CVE-2024-29945 is a vulnerability affecting Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, where sensitive authentication tokens can be inadvertently logged during the token validation process. This exposure arises specifically when Splunk Enterprise is running in debug mode or when the JsonWebToken component is configured to log at the DEBUG level. Under these conditions, authentication tokens, which are critical for user session validation and access control, may be written to log files. These logs could then be accessed by attackers who have gained access to the system or logs, providing them with valuable credentials to impersonate users or escalate privileges. The vulnerability requires that either debug mode is enabled or debug-level logging is configured, which typically requires administrative privileges, limiting the ease of exploitation. However, if exploited, the confidentiality, integrity, and availability of the system are all at high risk, as attackers could use the exposed tokens to bypass authentication and manipulate or disrupt Splunk services. No public exploits have been reported yet, but the vulnerability has been assigned a CVSS v3.1 score of 7.2, indicating a high severity. The issue was publicly disclosed on March 27, 2024, and affects multiple recent versions of Splunk Enterprise, a widely used platform for security information and event management (SIEM).
Potential Impact
For European organizations, the exposure of authentication tokens in Splunk Enterprise logs can lead to severe security breaches. Attackers who obtain these tokens could impersonate legitimate users, including administrators, leading to unauthorized access to sensitive data and systems. This can compromise the confidentiality of sensitive information, the integrity of log and event data, and the availability of Splunk services critical for security monitoring and incident response. Organizations in sectors such as finance, healthcare, energy, and government, which rely heavily on Splunk for security analytics, could face regulatory penalties under GDPR if personal data is exposed. The breach of authentication tokens also increases the risk of lateral movement within networks, potentially leading to broader compromises. Given Splunk's role in security operations, disruption or manipulation of its data can delay detection and response to other cyber threats, amplifying overall risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Splunk Enterprise to versions 9.2.1, 9.1.4, or 9.0.9 or later, where the issue is resolved. Until upgrades can be applied, disable debug mode and avoid setting the JsonWebToken component to DEBUG logging level to prevent sensitive token information from being logged. Access to log files should be strictly controlled and monitored, ensuring only authorized personnel can view or modify them. Implement robust logging and monitoring to detect any unauthorized changes to logging configurations or unexpected debug logging activity. Regularly audit Splunk configurations and logs for signs of token exposure or misuse. Additionally, enforce strong access controls and multi-factor authentication for administrative access to Splunk systems to reduce the risk of attackers enabling debug logging. Finally, review and rotate authentication tokens and credentials if exposure is suspected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Splunk
- Date Reserved
- 2024-03-21T21:09:44.795Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69418d7b9050fe8508ffc24c
Added to database: 12/16/2025, 4:48:59 PM
Last enriched: 12/16/2025, 5:06:43 PM
Last updated: 12/16/2025, 9:29:12 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-27561: n/a
HighCVE-2025-65834: n/a
UnknownCVE-2025-13532: CWE-916 Use of Password Hash With Insufficient Computational Effort in Fortra Core Privileged Access Manager (BoKS)
MediumCVE-2025-8872: CWE-400 Uncontrolled Resource Consumption in Arista Networks EOS
HighCVE-2025-68142: CWE-1333: Inefficient Regular Expression Complexity in facelessuser pymdown-extensions
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.