vulnerability
Splunk: CVE-2024-53247: Remote Code Execution through Deserialization of Untrusted Data in Splunk Secure Gateway app
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Dec 10, 2024 | Apr 7, 2025 | Mar 25, 2026 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Dec 10, 2024
Added
Apr 7, 2025
Modified
Mar 25, 2026
Description
In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE).The RCE is possible because of an unsafe deserialization of data due to an insecure usage of the jsonpickle Python library.
Solution
splunk-upgrade-latest
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.