ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·12/7/2023
CVE-2023-41266 added to CISA KEV: Qlik Sense
Status: ✅ Confirmed exploited in the wild
Date added: 2023-12-07
Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
Due date: 2023-12-28
Why this matters
Qlik Sense contains a path traversal vulnerability that allows a remote, unauthenticated attacker to create an anonymous session by sending maliciously crafted HTTP requests. This anonymous session could allow the attacker to send further requests to unauthorized endpoints.
Sources
Lyrie Verdict
Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.