Splunk has released a comprehensive security advisory addressing multiple critical vulnerabilities in third-party packages within SOAR versions 6.4.0 and 6.4.1.
The advisory, published on July 7, 2025, identifies significant security vulnerabilities across various components including git, Django, cryptography libraries, and JavaScript frameworks that could potentially compromise organizational security operations.
The company has implemented extensive remediation measures and strongly recommends immediate upgrades to version 6.4.1 to address these vulnerabilities.
The security advisory reveals several critical and high-severity vulnerabilities that pose significant risks to SOAR deployments:
Critical Vulnerabilities:
High-Severity Vulnerabilities:
These vulnerabilities span across multiple critical components including version control systems, web frameworks, JavaScript libraries, and security-related packages, making immediate remediation essential for maintaining secure SOAR operations.
The cross-spawn package vulnerability CVE-2024-21538 and the tornado framework vulnerability CVE-2024-52804 both carried high severity ratings, requiring immediate attention.
Additionally, the werkzeug component presented CVE-2024-49767, another high-severity vulnerability that demanded upgrading to version 3.0.6.
Splunk’s remediation strategy involved a systematic approach to updating affected packages across both SOAR versions 6.4.0 and 6.4.1:
Staged Package Upgrades:
Cryptography-Related Updates:
Standard Package Upgrades:
Package Removals:
Configuration Modifications:
This comprehensive approach demonstrates Splunk’s commitment to addressing vulnerabilities through multiple remediation strategies, including upgrades, removals, and configuration changes based on the most effective security approach for each component.
Organizations utilizing Splunk SOAR must prioritize immediate upgrades to version 6.4.1 or higher to protect against these vulnerabilities.
The advisory specifically affects SOAR base version 6.4 installations running versions below 6.4.1, making the upgrade path clearly defined and urgent.
The severity ratings adopted by Splunk follow both vendor assessments and the National Vulnerability Database (NVD) Common Vulnerability Scoring System (CVSS), ensuring consistent risk evaluation.
Given the presence of multiple critical and high-severity vulnerabilities, delayed patching could expose organizations to significant security risks, potentially compromising their security orchestration, automation, and response capabilities.
IT security teams should immediately assess their current SOAR deployments, schedule maintenance windows for upgrades, and implement version 6.4.1 as soon as operationally feasible to maintain robust security postures.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…