Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3331: Vulnerability in Spotfire Spotfire Enterprise Runtime for R - Server Edition

0
Medium
VulnerabilityCVE-2024-3331cvecve-2024-3331
Published: Thu Jun 27 2024 (06/27/2024, 18:50:13 UTC)
Source: CVE Database V5
Vendor/Project: Spotfire
Product: Spotfire Enterprise Runtime for R - Server Edition

Description

Vulnerability in Spotfire Spotfire Enterprise Runtime for R - Server Edition, Spotfire Spotfire Statistics Services, Spotfire Spotfire Analyst, Spotfire Spotfire Desktop, Spotfire Spotfire Server allows The impact of this vulnerability depends on the privileges of the user running the affected software..This issue affects Spotfire Enterprise Runtime for R - Server Edition: from 1.12.7 through 1.20.0; Spotfire Statistics Services: from 12.0.7 through 12.3.1, from 14.0.0 through 14.3.0; Spotfire Analyst: from 12.0.9 through 12.5.0, from 14.0.0 through 14.3.0; Spotfire Desktop: from 14.0 through 14.3.0; Spotfire Server: from 12.0.10 through 12.5.0, from 14.0.0 through 14.3.0.

AI-Powered Analysis

AILast updated: 02/26/2026, 22:42:08 UTC

Technical Analysis

CVE-2024-3331 is a vulnerability identified in multiple versions of Spotfire's analytics and runtime products, including Spotfire Enterprise Runtime for R - Server Edition, Spotfire Statistics Services, Spotfire Analyst, Spotfire Desktop, and Spotfire Server. The root cause is an authorization flaw classified under CWE-863, which means the software does not properly enforce access control policies, allowing users with certain privileges to perform unauthorized actions. The vulnerability affects versions from 1.12.7 through 1.20.0 for the Runtime for R Server Edition, and various ranges for other products, indicating a widespread issue across the Spotfire product line. The CVSS v3.1 score is 6.8 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), and a scope change (S:C). The impact primarily affects confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). This means an attacker could potentially access sensitive data they should not have access to, but cannot modify data or disrupt service. Exploitation requires a user with some privileges to interact with the system, which limits the attack surface but still poses a significant risk in environments where users have elevated rights. No public exploits are known at this time, but the broad range of affected versions and products suggests that organizations using Spotfire for business intelligence and analytics should be vigilant. The vulnerability’s impact depends heavily on the privileges of the user running the affected software, highlighting the importance of least privilege principles. The flaw could allow unauthorized data disclosure within enterprise environments, potentially exposing sensitive business intelligence data. The vulnerability was reserved in April 2024 and published in June 2024, with no patch links currently provided, indicating that fixes may be forthcoming.

Potential Impact

The vulnerability can lead to unauthorized disclosure of sensitive data within organizations using affected Spotfire products. Since Spotfire is widely used for data analytics and business intelligence, exposure of confidential data could result in competitive disadvantage, regulatory compliance violations, and reputational damage. The requirement for user privileges and interaction reduces the likelihood of remote exploitation by unauthenticated attackers but does not eliminate risk in environments with multiple users or where privilege escalation is possible. The confidentiality impact is high, but the integrity and availability of systems remain unaffected. Organizations with large deployments of Spotfire products, especially in sectors like finance, healthcare, and government, could face significant risks if attackers leverage this flaw to access sensitive analytics data. The lack of known exploits currently limits immediate threat but also means organizations should proactively prepare for potential exploitation once patches are available or exploits emerge. The scope change in the CVSS vector indicates that exploitation could affect resources beyond the initially vulnerable component, potentially broadening the impact within enterprise environments.

Mitigation Recommendations

Organizations should implement strict privilege management to ensure that users running Spotfire software have the minimum necessary permissions, reducing the risk of exploitation. Monitor user activities and access logs for unusual behavior related to Spotfire components. Since no patches are currently linked, maintain close communication with the vendor (TIBCO) for timely updates and apply patches as soon as they are released. Consider network segmentation to limit access to Spotfire servers and services, reducing exposure to potentially malicious users. Employ multi-factor authentication (MFA) for user accounts with elevated privileges to mitigate risks from compromised credentials. Conduct regular security assessments and penetration testing focused on Spotfire environments to identify potential exploitation paths. Educate users about the risks of interacting with suspicious content or links that could trigger exploitation. Finally, prepare incident response plans specific to potential data disclosure incidents involving Spotfire products.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
tibco
Date Reserved
2024-04-04T17:01:59.760Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0c89232ffcdb8a2524573

Added to database: 2/26/2026, 10:26:26 PM

Last enriched: 2/26/2026, 10:42:08 PM

Last updated: 2/26/2026, 11:37:07 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses