Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions

Posted on July 9, 2025July 9, 2025 By CWS

Splunk has launched vital safety updates addressing a number of Frequent Vulnerabilities and Exposures (CVEs) in third-party packages throughout Enterprise variations 9.4.3, 9.3.5, 9.2.7, 9.1.10, and better. 

Revealed on July 7, 2025, these updates remediate high-severity vulnerabilities in important parts, together with setuptools, golang.org/x/crypto, OpenSSL, and libcurl packages that might probably compromise system safety.

Key Takeaways1. Splunk addressing vital CVEs in third-party packages throughout Enterprise variations.2. Updates embody setuptools, golang.org/x/crypto, libcurl (10 CVEs), OpenSSL, and golang runtime parts.3. Improve to minimal variations: Enterprise 9.4.3, 9.3.5, 9.2.7, or 9.1.10.4. All supported Enterprise variations obtain applicable safety patches regardless of some element limitations in older variations.

Vital GoLang x/crypto Vulnerability

The safety advisory identifies a number of vital and high-severity vulnerabilities requiring fast consideration. 

Probably the most vital vulnerability, CVE-2024-45337 with a severity ranking of “Vital,” impacts golang.org/x/crypto within the spl2-orchestrator element. 

This flaw represents a high-severity within the cryptographic implementations utilized by Go functions, probably permitting attackers to compromise encrypted communications or bypass safety controls.

The vulnerability particularly impacts functions that make the most of the golang.org/x/crypto package deal for cryptographic operations, together with encryption, decryption, and safe key administration. 

Within the context of Splunk Enterprise, this CVE impacts the spl2-orchestrator element, which handles orchestration duties throughout the Splunk platform.

Excessive-Severity Flaws in Setuptools, GoLang, and Libcurl 

Excessive-severity vulnerabilities embody CVE-2024-6345 in setuptools, CVE-2025-22869 in golang.org/x/crypto id element, and a number of CVEs affecting golang packages in Mongodump and Mongorestore utilities.

The libcurl package deal presents notably regarding publicity, with upgrades addressing ten separate CVEs, together with CVE-2024-0853, CVE-2024-2398, CVE-2024-2466, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2024-11053, CVE-2025-0167, and CVE-2025-0725. 

These vulnerabilities span throughout completely different severity ranges, with most categorised as high-risk, probably permitting unauthorized entry or system compromise.

PackagePatched Model / RemediationCVE ID(s)SeveritysetuptoolsUpgraded to 70.0.0CVE-2024-6345Highgolang.org/x/crypto (compsup)Upgraded to 0.37.0CVE-2024-45337, CVE-2025-22869, CVE-2025-27414, CVE-2025-22868, CVE-2025-23387, CVE-2025-23389, CVE-2025-23388, CVE-2025-22952, CVE-2024-45338Highgolang.org/x/crypto (id)Upgraded to 0.36.0CVE-2025-22869Highgolang.org/x/crypto (spl2-orchestrator)Upgraded to 0.36.0CVE-2024-45337Criticalgolang.org/x/web (compsup)Upgraded to 0.39.0CVE-2024-45338Mediumgolang.org/x/web (spl2-orchestrator)Upgraded to 0.37.0CVE-2024-45338Mediumgolang (Mongodump)Upgraded to 1.24.2CVE-2025-22869, CVE-2025-27414, CVE-2025-22868, CVE-2025-23387, CVE-2025-23389, CVE-2025-23388, CVE-2025-22952, CVE-2024-45338, CVE-2025-22870Highgolang (Mongorestore)Upgraded to 1.24.2CVE-2025-22869, CVE-2025-27414, CVE-2025-22868, CVE-2025-23387, CVE-2025-23389, CVE-2025-23388, CVE-2025-22952, CVE-2024-45338, CVE-2025-22870Highgolang (spl2-orchestrator)Upgraded to 1.24.0Multiple CVEsHighBeakerUpgraded to 1.12.1CVE-2013-7489Mediumazure-storage-blobUpgraded to 12.13.0CVE-2022-30187MediumOpenSSLUpgraded to 1.0.2zlCVE-2024-13176LowOpenSSLUpgraded to 1.0.2zlCVE-2024-9143InformationallibcurlUpgraded to eight.11.1CVE-2024-0853, CVE-2024-2398, CVE-2024-2466, CVE-2024-7264, CVE-2024-8096, CVE-2024-9681, CVE-2024-11053, CVE-2025-0167, CVE-2025-0725High

Organizations should instantly improve to the next minimal variations: Splunk Enterprise 9.4.3 (from 9.4.0-9.4.2), 9.3.5 (from 9.3.0-9.3.4), 9.2.7 (from 9.2.0-9.2.6), or 9.1.10 (from 9.1.0-9.1.9). 

It’s necessary to notice that sure binaries like compsup will not be current in 9.1.x variations, and spl2-orchestrator is absent from 9.3.x, 9.2.x, 9.1.x, and older variations. 

Regardless of these version-specific limitations, all supported Enterprise variations obtain applicable safety patches for his or her respective parts, guaranteeing complete safety throughout the deployment ecosystem.

Suppose like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now

Cyber Security News Tags:Address, Enterprise, Packages, Party, Splunk, Versions, Vulnerabilities

Post navigation

Previous Post: U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme
Next Post: Samsung Announces Security Improvements for Galaxy Smartphones

Related Posts

New Scraper Botnet with 3,600+ Unique Devices Attacking Targets in US and UK Cyber Security News
Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads Cyber Security News
Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
US to Offer $10 Million Reward for Details About RedLine Malware Developer Cyber Security News
NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News
Halo Security Honored with 2025 MSP Today Product of the Year Award Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News