Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3331: Vulnerability in Spotfire Spotfire Enterprise Runtime for R - Server Edition

0
Medium
VulnerabilityCVE-2024-3331cvecve-2024-3331
Published: Thu Jun 27 2024 (06/27/2024, 18:50:13 UTC)
Source: CVE Database V5
Vendor/Project: Spotfire
Product: Spotfire Enterprise Runtime for R - Server Edition

Description

Vulnerability in Spotfire Spotfire Enterprise Runtime for R - Server Edition, Spotfire Spotfire Statistics Services, Spotfire Spotfire Analyst, Spotfire Spotfire Desktop, Spotfire Spotfire Server allows The impact of this vulnerability depends on the privileges of the user running the affected software..This issue affects Spotfire Enterprise Runtime for R - Server Edition: from 1.12.7 through 1.20.0; Spotfire Statistics Services: from 12.0.7 through 12.3.1, from 14.0.0 through 14.3.0; Spotfire Analyst: from 12.0.9 through 12.5.0, from 14.0.0 through 14.3.0; Spotfire Desktop: from 14.0 through 14.3.0; Spotfire Server: from 12.0.10 through 12.5.0, from 14.0.0 through 14.3.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:31:50 UTC

Technical Analysis

CVE-2024-3331 is a vulnerability identified in several versions of Spotfire's analytics and runtime products, including Spotfire Enterprise Runtime for R - Server Edition (versions 1.12.7 through 1.20.0), Spotfire Statistics Services (versions 12.0.7 through 12.3.1 and 14.0.0 through 14.3.0), Spotfire Analyst (versions 12.0.9 through 12.5.0 and 14.0.0 through 14.3.0), Spotfire Desktop (versions 14.0 through 14.3.0), and Spotfire Server (versions 12.0.10 through 12.5.0 and 14.0.0 through 14.3.0). The vulnerability is categorized under CWE-863, which involves improper authorization, meaning that the software does not correctly enforce access control policies. The impact depends on the privileges of the user running the affected software, implying that an attacker with limited privileges could exploit this flaw to gain unauthorized access to confidential information. The CVSS v3.1 vector indicates the attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The confidentiality impact is high (C:H), while integrity and availability impacts are none (I:N, A:N). No public exploits are known at this time, and no patches are linked yet, indicating that mitigation may currently rely on compensating controls. The vulnerability affects core components of the Spotfire analytics platform, widely used in enterprise environments for data visualization and analytics, which could expose sensitive business intelligence data if exploited.

Potential Impact

The vulnerability poses a significant risk to organizations relying on Spotfire analytics platforms, especially those handling sensitive or proprietary data. Exploitation could lead to unauthorized disclosure of confidential information, potentially exposing business intelligence, analytics results, or sensitive datasets. Since the vulnerability requires some level of user privileges and interaction, insider threats or compromised user accounts could be leveraged by attackers to escalate access. The changed scope indicates that the attacker could access resources beyond their initial privileges, increasing the potential damage. Although integrity and availability are not impacted, confidentiality breaches alone can result in regulatory penalties, loss of competitive advantage, and reputational damage. Enterprises in sectors such as finance, healthcare, government, and manufacturing that use Spotfire for critical analytics are particularly at risk. The absence of known exploits currently reduces immediate risk but also underscores the importance of proactive mitigation before attackers develop exploit code.

Mitigation Recommendations

Organizations should implement strict access control policies to limit user privileges to the minimum necessary, reducing the risk of exploitation by low-privilege users. Network segmentation and firewall rules should restrict access to Spotfire servers and services to trusted users and systems only. Monitoring and logging user activities within Spotfire environments can help detect suspicious behavior indicative of exploitation attempts. Until official patches are released, consider disabling or restricting features that require user interaction or network exposure related to the affected components. Conduct thorough audits of user accounts and permissions to identify and remediate excessive privileges. Engage with the vendor (TIBCO) for timely updates and apply patches immediately upon release. Additionally, educate users about phishing and social engineering risks to reduce the likelihood of user interaction-based exploitation. Employ endpoint protection and network intrusion detection systems to identify anomalous activities targeting Spotfire services.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
tibco
Date Reserved
2024-04-04T17:01:59.760Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0c89232ffcdb8a2524573

Added to database: 2/26/2026, 10:26:26 PM

Last enriched: 3/6/2026, 9:31:50 PM

Last updated: 4/12/2026, 9:31:19 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses