Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49587: The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. in Palantir com.palantir.gotham:glutton

0
Critical
VulnerabilityCVE-2024-49587cvecve-2024-49587
Published: Fri Dec 19 2025 (12/19/2025, 16:33:22 UTC)
Source: CVE Database V5
Vendor/Project: Palantir
Product: com.palantir.gotham:glutton

Description

Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances

AI-Powered Analysis

AILast updated: 12/19/2025, 16:49:51 UTC

Technical Analysis

CVE-2024-49587 is a critical security vulnerability identified in the Glutton V1 service component of Palantir Gotham, a widely used data integration and analysis platform. The core issue arises because Glutton service endpoints were exposed without any authentication controls on Gotham stacks, effectively allowing any user, including those without permissions, to directly access the Glutton backend. This access enables unauthorized reading, updating, or deletion of sensitive data. The vulnerability is not due to a flaw in the authentication algorithm itself, which is sound, but rather due to a separate implementation weakness that bypasses the authentication mechanism entirely. This results in a severe security gap where the intended access controls are circumvented. The vulnerability has been assigned a CVSS v3.1 score of 9.1 (critical), reflecting its network exploitable nature (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), with no impact on availability (A:N). Although no known exploits have been reported in the wild, the potential for abuse is significant given the sensitive data typically handled by Gotham deployments. Palantir has addressed the issue by patching the affected service and deploying the fix automatically to all Apollo-managed Gotham instances, reducing the window of exposure. However, organizations managing their own Gotham deployments must ensure timely patching. The vulnerability highlights the critical importance of proper authentication enforcement on backend services, especially those exposed to internal or external networks.

Potential Impact

For European organizations, the impact of CVE-2024-49587 can be severe. Palantir Gotham is extensively used by government agencies, defense contractors, law enforcement, and critical infrastructure operators across Europe for data analytics and intelligence purposes. Unauthorized access to Glutton backend services could lead to unauthorized disclosure of sensitive or classified information, manipulation or deletion of critical datasets, and potential disruption of analytical operations. This compromises confidentiality and integrity, potentially undermining national security, law enforcement investigations, and critical decision-making processes. The lack of availability impact means systems remain operational, but the trustworthiness and security of data are compromised. The vulnerability's ease of exploitation without authentication or user interaction increases the risk of insider threats or external attackers gaining foothold if network access is possible. European entities relying on Palantir Gotham must consider the risk of espionage, data breaches, and operational sabotage, especially in countries with high Palantir adoption in sensitive sectors.

Mitigation Recommendations

1. Immediate application of the official patch provided by Palantir to all Gotham instances, including those not managed by Apollo, is critical. 2. Conduct a thorough audit of network configurations to ensure that Glutton service endpoints are not exposed to untrusted networks or users. 3. Implement strict network segmentation and access controls to limit access to backend services only to authorized systems and personnel. 4. Deploy continuous monitoring and anomaly detection on Gotham environments to identify unauthorized access attempts or unusual data modifications. 5. Review and enhance authentication and authorization mechanisms for all backend services, ensuring defense-in-depth. 6. Conduct regular security assessments and penetration testing focused on backend service exposure. 7. Educate system administrators and security teams about this vulnerability and the importance of timely patching and access control enforcement. 8. Maintain an incident response plan specifically addressing potential data breaches or unauthorized access scenarios related to Gotham deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Palantir
Date Reserved
2024-10-16T19:09:45.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69458084f063e4fadff5e82a

Added to database: 12/19/2025, 4:42:44 PM

Last enriched: 12/19/2025, 4:49:51 PM

Last updated: 12/19/2025, 7:26:49 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats