<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is Splunk Enterprise 9.4.0 (build 6b4ebe426ca6) affected by CVE-2024-7264? in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/743681#M22043</link>
    <description>&lt;P&gt;Was there any answer to this? I have the same CVE pop up on my scan and want to find a fix/workaround for it. thanks!&lt;/P&gt;</description>
    <pubDate>Mon, 07 Apr 2025 12:20:28 GMT</pubDate>
    <dc:creator>jrubio</dc:creator>
    <dc:date>2025-04-07T12:20:28Z</dc:date>
    <item>
      <title>Is Splunk Enterprise 9.4.0 (build 6b4ebe426ca6) affected by CVE-2024-7264?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/710283#M21517</link>
      <description>&lt;P&gt;I have Splunk Enterprise 9.4.0 (build 6b4ebe426ca6) installed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My security team flagged a possible vuln on /opt/splunk/opt/mongo/lib/libcurl.so.4.8.0 related to CVE-2024-7264, which apparently affects libcurl versions between 7.32.0 and prior to 8.9.1. I ran both the following commands&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;splunk cmd curl --version

splunk cmd mongodb --version&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and confirmed the libcurl version is affected. The relevant results were:&lt;/P&gt;&lt;P&gt;Curl:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;curl 7.61.1 ... libcurl/7.61.1 ...&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mongod:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;mongod: /opt/splunk/lib/libcrypto.so.10: no version information available (required by mongod)
mongod: /opt/splunk/lib/libcrypto.so.10: no version information available (required by mongod)
mongod: /opt/splunk/lib/libcrypto.so.10: no version information available (required by mongod)
mongod: /opt/splunk/lib/libssl.so.10: no version information available (required by mongod)
db version v7.0.14
Build Info: {
    "version": "7.0.14",
    ...
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I go about disabling Mongod (if possible)?&lt;/P&gt;&lt;P&gt;Alternatively, is there any info on whether this will be addressed in a future update or if this is relevant at all for Splunk Enterprise?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 18:03:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/710283#M21517</guid>
      <dc:creator>StephenD1</dc:creator>
      <dc:date>2025-01-30T18:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Is Splunk Enterprise 9.4.0 (build 6b4ebe426ca6) affected by CVE-2024-7264?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/743681#M22043</link>
      <description>&lt;P&gt;Was there any answer to this? I have the same CVE pop up on my scan and want to find a fix/workaround for it. thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2025 12:20:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/743681#M22043</guid>
      <dc:creator>jrubio</dc:creator>
      <dc:date>2025-04-07T12:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: Is Splunk Enterprise 9.4.0 (build 6b4ebe426ca6) affected by CVE-2024-7264?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/746284#M22262</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The Splunk fix is known as SPL-270280. &amp;nbsp;A&amp;nbsp;fix has been included in the latest version 9.4.2 and backported to supported versions of older releases&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;9.3.4, 9.2.6 and 9.1.9&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="https://splunk.my.site.com/customer/s/article/Splunk-vulnerability-libcurl-7-32-0-8-9-1-DoS-CVE-2024-7264-TEN-205024" target="_blank"&gt;https://splunk.my.site.com/customer/s/article/Splunk-vulnerability-libcurl-7-32-0-8-9-1-DoS-CVE-2024-7264-TEN-205024&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 May 2025 22:24:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/746284#M22262</guid>
      <dc:creator>bendeloitte</dc:creator>
      <dc:date>2025-05-15T22:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Is Splunk Enterprise 9.4.0 (build 6b4ebe426ca6) affected by CVE-2024-7264?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/746301#M22265</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/272718"&gt;@StephenD1&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Yes, Splunk Enterprise 9.4.0 (build 6b4ebe426ca6) is affected by CVE-2024-7264. This vulnerability affects libcurl versions between 7.32.0 and prior to 8.9.1, and as you confirmed, your installation includes libcurl 7.61.1, which falls within this range.&lt;/P&gt;&lt;P&gt;## Official Fix&lt;BR /&gt;According to the latest information:&lt;BR /&gt;- The Splunk fix is identified as SPL-270280&lt;BR /&gt;- The fix has been included in Splunk Enterprise 9.4.2&lt;BR /&gt;- The fix has also been backported to supported older versions: 9.3.4, 9.2.6, and 9.1.9&lt;/P&gt;&lt;P&gt;## Recommended Actions&lt;/P&gt;&lt;P&gt;### Option 1: Upgrade to a Patched Version&lt;BR /&gt;The most comprehensive solution is to upgrade to one of the fixed versions:&lt;BR /&gt;- Splunk Enterprise 9.4.2 (preferred for your current version)&lt;BR /&gt;- Or one of the other patched versions (9.3.4, 9.2.6, or 9.1.9)&lt;/P&gt;&lt;P&gt;### Option 2: Disable KVStore (MongoDB) Temporarily&lt;BR /&gt;If you cannot upgrade immediately, you can consider disabling the KVStore service, which uses MongoDB:&lt;/P&gt;&lt;P&gt;1. Check if any critical apps depend on KVStore:&lt;BR /&gt;```&lt;BR /&gt;splunk list kvstore -collections&lt;BR /&gt;```&lt;/P&gt;&lt;P&gt;2. Disable KVStore:&lt;BR /&gt;```&lt;BR /&gt;splunk disable kvstore&lt;BR /&gt;splunk restart&lt;BR /&gt;```&lt;/P&gt;&lt;P&gt;3. Verify MongoDB is no longer running:&lt;BR /&gt;```&lt;BR /&gt;ps -ef | grep mongo&lt;BR /&gt;```&lt;/P&gt;&lt;P&gt;Note that disabling KVStore will impact any apps that rely on it, including:&lt;BR /&gt;- Enterprise Security&lt;BR /&gt;- ITSI&lt;BR /&gt;- Splunk App for Infrastructure&lt;BR /&gt;- Some custom apps that use KVStore collections&lt;/P&gt;&lt;P&gt;### Option 3: Mitigate Risk Through Network Controls&lt;BR /&gt;If you can't upgrade or disable KVStore:&lt;BR /&gt;- Ensure MongoDB is properly configured to only listen on localhost&lt;BR /&gt;- Implement additional network controls to restrict access to the MongoDB port (typically 8191)&lt;BR /&gt;- Monitor for potential exploitation attempts&lt;/P&gt;&lt;P&gt;## Additional Information&lt;BR /&gt;You can find more details in the Splunk article regarding this vulnerability:&lt;BR /&gt;&lt;A href="https://splunk.my.site.com/customer/s/article/Splunk-vulnerability-libcurl-7-32-0-8-9-1-DoS-CVE-2024-7264" target="_blank"&gt;https://splunk.my.site.com/customer/s/article/Splunk-vulnerability-libcurl-7-32-0-8-9-1-DoS-CVE-2024-7264&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The CVE-2024-7264 is a denial-of-service vulnerability in libcurl that could allow a malicious server to cause a denial of service by sending specially crafted responses that trigger excessive memory consumption.&lt;/P&gt;&lt;P&gt;## Long-term Recommendation&lt;BR /&gt;For a more permanent solution, plan to upgrade to the patched version as soon as your change management process allows. This is especially important if you have internet-facing Splunk components that might be vulnerable to this exploitation vector.&lt;BR /&gt;&lt;BR /&gt;Please give&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt; for support&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt; happly splunking ....&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2025 10:02:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Is-Splunk-Enterprise-9-4-0-build-6b4ebe426ca6-affected-by-CVE/m-p/746301#M22265</guid>
      <dc:creator>asimit</dc:creator>
      <dc:date>2025-05-16T10:02:24Z</dc:date>
    </item>
  </channel>
</rss>

