Splunk Patches Critical Vulnerabilities in SOAR 64: What You Need to Know About SVD-2025-0712

Listen to this Post

Featured Image

Strengthening

In an age where cyber threats evolve at breakneck speed, security platforms like Splunk SOAR (Security Orchestration, Automation and Response) are vital in safeguarding enterprise ecosystems. On July 7, 2025, Splunk released a crucial security advisory — tagged SVD-2025-0712 — alerting users to multiple vulnerabilities embedded in third-party packages bundled with SOAR versions 6.4.0 and 6.4.1. The advisory outlines high-risk and critical issues, many of which could lead to remote code execution, denial-of-service attacks, or significant performance degradation. This extensive update not only highlights the severity of certain flaws but also reinforces Splunk’s proactive approach to threat management. Security teams are urged to upgrade immediately to the patched 6.4.1 release or later, underscoring the urgency and gravity of these discovered weaknesses.

Splunk SOAR 6.4.1 Update: Critical and High-Severity Fixes Rolled Out

Splunk’s newly released advisory SVD-2025-0712 highlights a comprehensive wave of fixes targeting critical and high-severity vulnerabilities in third-party packages tied to SOAR versions 6.4.0 and 6.4.1. A primary concern addressed is CVE-2024-32002, a critical Git vulnerability allowing attackers to exploit submodules and execute malicious hooks during repository cloning. This vulnerability, impacting Git versions prior to 2.45.1, was neutralized by upgrading to Git 2.48.1.

Another severe issue, CVE-2024-48949, stemmed from the @babel/traverse package, essential in JavaScript compilation within SOAR’s UI. It was upgraded in version 6.4.0 and fully removed in 6.4.1 to mitigate potential exploitation risks.

Among high-severity flaws, Django was upgraded to version 4.2.20 to resolve CVE-2024-45230, preventing denial-of-service scenarios via its template filters. Tornado, another vital web framework, received a patch for CVE-2024-52804, fixing a CPU exhaustion bug caused by flawed HTTP cookie parsing.

Werkzeug, crucial for server-side processing, was updated to thwart CVE-2024-49767 — a vulnerability that previously allowed attackers to consume excessive memory using malicious form submissions. The cryptography library also received an upgrade to version 44.0.1 to address CVE-2024-12797, eliminating risks related to TLS authentication using raw public keys.

Several medium-severity issues were also tackled. The @babel/runtime package was updated to fix CVE-2025-27789, and Jinja — a popular templating engine — was bumped to version 3.1.4 to resolve CVE-2024-34064. PyOpenSSL received a patch for the same TLS vulnerability seen in cryptography.

Splunk also altered the Avahi daemon configuration, setting enable-wide-area to no in its config file to protect against CVE-2024-52616. This change helps safeguard against potential lateral movement attacks via the Avahi service discovery protocol.

Splunk is strongly urging all users to upgrade their SOAR environments to version 6.4.1 or higher. The urgency stems from the widespread nature of these flaws and their potential impact on operational efficiency and system integrity. As part of this effort, the company has doubled down on third-party dependency reviews, showcasing a deepened commitment to platform security.

What Undercode Say:

The Risks Behind Third-Party Dependencies

The Splunk advisory sheds light on one of the most persistent threats in modern security software — reliance on third-party packages. In complex platforms like SOAR, these dependencies multiply rapidly and often remain under-examined until a vulnerability emerges. The inclusion of widely-used components like Git, Django, Tornado, and Werkzeug illustrates the broader challenge: even robust security platforms are only as secure as the libraries they rely upon.

Remote Code Execution: A Top-Tier Threat

The Git vulnerability (CVE-2024-32002) is particularly alarming due to its potential to grant attackers remote code execution privileges. If leveraged, this flaw could provide deep access to internal systems, undermining the very defenses SOAR is meant to enhance. That it requires symbolic link support on case-insensitive systems doesn’t diminish its severity — attackers often exploit even niche vectors in real-world attacks.

Web Application Layer Exposures

Patching issues in @babel/traverse and Django demonstrates the frequent exposure at the web interface layer. These packages, while powerful, expand the attack surface of the SOAR platform. The removal of @babel/traverse altogether in 6.4.1 reflects a growing trend: reducing unnecessary code paths to improve security posture.

Performance and Stability Risks

High-severity vulnerabilities in Tornado and Werkzeug emphasize the importance of performance stability in security tools. Tornado’s flawed cookie parser could paralyze SOAR’s responsiveness, while Werkzeug’s memory exhaustion vulnerability might cause complete system crashes under specific attack conditions. For a platform tasked with automating and responding to threats, performance is not a luxury — it’s a requirement.

TLS Vulnerabilities Revisited

CVE-2024-12797 reappears across two libraries: cryptography and pyOpenSSL. This shared vulnerability across multiple packages illustrates how a single bug can propagate within an ecosystem. It also speaks to the complexity of TLS implementations, which remain a minefield for subtle, devastating flaws.

Avahi Exposure: A Less Obvious Vector

The Avahi daemon change is a smart security hardening move. While not as headline-grabbing as RCE or DoS flaws, mDNS-based vulnerabilities like CVE-2024-52616 can provide lateral access opportunities within internal networks. Disabling wide-area announcements narrows the potential attack surface — a best practice often overlooked in default configurations.

Strategic Security Posture from Splunk

Overall, the speed and breadth of this update indicate that Splunk is taking its SOAR security posture seriously. Rather than issuing piecemeal fixes, the company bundled critical, high, and medium-severity updates together — making it easier for enterprise security teams to implement changes in a coordinated fashion.

This release also hints at a strategic shift in how security vendors are approaching updates. By addressing vulnerabilities not just by severity, but by component role (web interface, cryptographic layer, network discovery), Splunk ensures layered resilience across the stack. It’s a roadmap that other vendors would be wise to emulate.

🔍 Fact Checker Results:

✅ CVE-2024-32002 in Git was officially disclosed and patched with version 2.48.1
✅ All affected packages, including Django, Tornado, and Werkzeug, have published CVEs with confirmed fixes
✅ Splunk SOAR version 6.4.1 includes all remediations listed in advisory SVD-2025-0712

📊 Prediction:

Given the escalating complexity of supply chain security, Splunk’s latest patch strategy is likely to set a new standard in enterprise threat response platforms. Expect to see more frequent consolidated updates across SOAR competitors as industry-wide scrutiny of third-party packages intensifies. Cyber insurers may even begin to evaluate SOAR versioning as a factor in underwriting decisions.

References:

Reported By: cyberpress.org
Extra Source Hub:
https://www.reddit.com/r/AskReddit
Wikipedia
OpenAi & Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

🔐JOIN OUR CYBER WORLD [ CVE News • HackMonitor • UndercodeNews ]

💬 Whatsapp | 💬 Telegram

📢 Follow UndercodeNews & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | 🔗 Linkedin