The vulnerabilities affect essential components, including git, Django, cryptography libraries, and JavaScript packages, requiring immediate attention from security administrators managing Splunk SOAR deployments. High-severity vulnerabilities include CVE-2024-45230 in Django, CVE-2024-21538 in cross-spawn, CVE-2024-52804 in tornado, CVE-2022-35583 wkhtml vulnerability, CVE-2024-6345 in Setuptools, CVE-2024-39338 in Axios JavaScript library and CVE-2024-49767 in Werkzeug WSGI utility library. The critical severity rating indicates this vulnerability poses significant security risks and requires immediate attention from system administrators. Third-party components upgraded, including Django, cryptography, jQuery DataTables, and wkhtml removal, covering vulnerabilities from critical to medium severity. The advisory affects all SOAR base version 6.4 installations below 6.4.1, making this update essential for maintaining security posture. Unpatched vulnerabilities could enable unauthorized access, code execution, and data manipulation across the core SOAR infrastructure. However, in the subsequent SOAR version 6.4.1, Splunk took the more decisive approach of completely removing the @babel/traverse package to eliminate the vulnerability entirely. These vulnerabilities could potentially allow unauthorized access, code execution, or data manipulation within the SOAR environment.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 09 Jul 2025 13:30:16 +0000