CVE-2024-49587: The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. in Palantir com.palantir.gotham:glutton
Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances
AI Analysis
Technical Summary
CVE-2024-49587 is a critical security vulnerability identified in the Glutton V1 service component of Palantir Gotham, a widely used data integration and analysis platform. The core issue arises because Glutton service endpoints were exposed without any authentication controls on Gotham stacks, effectively allowing any user, including those without permissions, to directly access the Glutton backend. This access enables unauthorized reading, updating, or deletion of sensitive data. The vulnerability is not due to a flaw in the authentication algorithm itself, which is sound, but rather due to a separate implementation weakness that bypasses the authentication mechanism entirely. This results in a severe security gap where the intended access controls are circumvented. The vulnerability has been assigned a CVSS v3.1 score of 9.1 (critical), reflecting its network exploitable nature (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), with no impact on availability (A:N). Although no known exploits have been reported in the wild, the potential for abuse is significant given the sensitive data typically handled by Gotham deployments. Palantir has addressed the issue by patching the affected service and deploying the fix automatically to all Apollo-managed Gotham instances, reducing the window of exposure. However, organizations managing their own Gotham deployments must ensure timely patching. The vulnerability highlights the critical importance of proper authentication enforcement on backend services, especially those exposed to internal or external networks.
Potential Impact
For European organizations, the impact of CVE-2024-49587 can be severe. Palantir Gotham is extensively used by government agencies, defense contractors, law enforcement, and critical infrastructure operators across Europe for data analytics and intelligence purposes. Unauthorized access to Glutton backend services could lead to unauthorized disclosure of sensitive or classified information, manipulation or deletion of critical datasets, and potential disruption of analytical operations. This compromises confidentiality and integrity, potentially undermining national security, law enforcement investigations, and critical decision-making processes. The lack of availability impact means systems remain operational, but the trustworthiness and security of data are compromised. The vulnerability's ease of exploitation without authentication or user interaction increases the risk of insider threats or external attackers gaining foothold if network access is possible. European entities relying on Palantir Gotham must consider the risk of espionage, data breaches, and operational sabotage, especially in countries with high Palantir adoption in sensitive sectors.
Mitigation Recommendations
1. Immediate application of the official patch provided by Palantir to all Gotham instances, including those not managed by Apollo, is critical. 2. Conduct a thorough audit of network configurations to ensure that Glutton service endpoints are not exposed to untrusted networks or users. 3. Implement strict network segmentation and access controls to limit access to backend services only to authorized systems and personnel. 4. Deploy continuous monitoring and anomaly detection on Gotham environments to identify unauthorized access attempts or unusual data modifications. 5. Review and enhance authentication and authorization mechanisms for all backend services, ensuring defense-in-depth. 6. Conduct regular security assessments and penetration testing focused on backend service exposure. 7. Educate system administrators and security teams about this vulnerability and the importance of timely patching and access control enforcement. 8. Maintain an incident response plan specifically addressing potential data breaches or unauthorized access scenarios related to Gotham deployments.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2024-49587: The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. in Palantir com.palantir.gotham:glutton
Description
Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances
AI-Powered Analysis
Technical Analysis
CVE-2024-49587 is a critical security vulnerability identified in the Glutton V1 service component of Palantir Gotham, a widely used data integration and analysis platform. The core issue arises because Glutton service endpoints were exposed without any authentication controls on Gotham stacks, effectively allowing any user, including those without permissions, to directly access the Glutton backend. This access enables unauthorized reading, updating, or deletion of sensitive data. The vulnerability is not due to a flaw in the authentication algorithm itself, which is sound, but rather due to a separate implementation weakness that bypasses the authentication mechanism entirely. This results in a severe security gap where the intended access controls are circumvented. The vulnerability has been assigned a CVSS v3.1 score of 9.1 (critical), reflecting its network exploitable nature (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), with no impact on availability (A:N). Although no known exploits have been reported in the wild, the potential for abuse is significant given the sensitive data typically handled by Gotham deployments. Palantir has addressed the issue by patching the affected service and deploying the fix automatically to all Apollo-managed Gotham instances, reducing the window of exposure. However, organizations managing their own Gotham deployments must ensure timely patching. The vulnerability highlights the critical importance of proper authentication enforcement on backend services, especially those exposed to internal or external networks.
Potential Impact
For European organizations, the impact of CVE-2024-49587 can be severe. Palantir Gotham is extensively used by government agencies, defense contractors, law enforcement, and critical infrastructure operators across Europe for data analytics and intelligence purposes. Unauthorized access to Glutton backend services could lead to unauthorized disclosure of sensitive or classified information, manipulation or deletion of critical datasets, and potential disruption of analytical operations. This compromises confidentiality and integrity, potentially undermining national security, law enforcement investigations, and critical decision-making processes. The lack of availability impact means systems remain operational, but the trustworthiness and security of data are compromised. The vulnerability's ease of exploitation without authentication or user interaction increases the risk of insider threats or external attackers gaining foothold if network access is possible. European entities relying on Palantir Gotham must consider the risk of espionage, data breaches, and operational sabotage, especially in countries with high Palantir adoption in sensitive sectors.
Mitigation Recommendations
1. Immediate application of the official patch provided by Palantir to all Gotham instances, including those not managed by Apollo, is critical. 2. Conduct a thorough audit of network configurations to ensure that Glutton service endpoints are not exposed to untrusted networks or users. 3. Implement strict network segmentation and access controls to limit access to backend services only to authorized systems and personnel. 4. Deploy continuous monitoring and anomaly detection on Gotham environments to identify unauthorized access attempts or unusual data modifications. 5. Review and enhance authentication and authorization mechanisms for all backend services, ensuring defense-in-depth. 6. Conduct regular security assessments and penetration testing focused on backend service exposure. 7. Educate system administrators and security teams about this vulnerability and the importance of timely patching and access control enforcement. 8. Maintain an incident response plan specifically addressing potential data breaches or unauthorized access scenarios related to Gotham deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Palantir
- Date Reserved
- 2024-10-16T19:09:45.689Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69458084f063e4fadff5e82a
Added to database: 12/19/2025, 4:42:44 PM
Last enriched: 12/19/2025, 4:49:51 PM
Last updated: 12/19/2025, 7:26:49 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14964: Stack-based Buffer Overflow in TOTOLINK T10
CriticalCVE-2025-14965: Path Traversal in 1541492390c yougou-mall
MediumCVE-2025-14962: Cross Site Scripting in code-projects Simple Stock System
MediumCVE-2025-14961: SQL Injection in code-projects Simple Blood Donor Management System
MediumCVE-2025-14960: SQL Injection in code-projects Simple Blood Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.