Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances
History

Fri, 19 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
Description Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances
Title Glutton V1 endpoints missing authentication
Weaknesses CWE-305
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Palantir

Published:

Updated: 2025-12-19T18:00:36.289Z

Reserved: 2024-10-16T19:09:45.689Z

Link: CVE-2024-49587

cve-icon Vulnrichment

Updated: 2025-12-19T17:24:37.443Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-19T17:15:50.643

Modified: 2025-12-19T18:00:18.330

Link: CVE-2024-49587

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.