### [CVE-2024-36984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36984) ![](https://img.shields.io/static/v1?label=Product&message=Splunk%20Enterprise&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=9.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=The%20application%20deserializes%20untrusted%20data%20without%20sufficiently%20verifying%20that%20the%20resulting%20data%20will%20be%20valid.&color=brightgreen) ### Description In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code. ### POC #### Reference - https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ #### Github No PoCs found on GitHub currently.