Skip to main content
Announcements
Join us at Qlik Connect for 3 magical days of learning, networking,and inspiration! REGISTER TODAY and save!
Sonja_Bauernfeind
Digital Support
Digital Support

Update 21st of March 16:00 CET: published CVE number
Update 27th of March 10:45 CET: added FAQ

Hello Qlik Users,

A security issue in QlikView has been identified and patches have been made available. Details can be found in the Security Bulletin High Severity Security fix for QlikView (CVE-2024-29863).

Today, 20th of March 2024, we have released two service releases across the latest versions of QlikView to patch the reported issue. All versions of QlikView prior to and including the releases below are impacted:

  • QlikView May 2023 SR1 (12.80.20100)
  • QlikView May 2022 SR2 (12.70.20200)

 

Call to Action

As no workarounds can be provided, Customers should upgrade QlikView to one of the following versions that contain the fix:

  • QlikView May 2023 SR2 (12.80.20200)
  • QlikView May 2022 SR3 (12.70.20300)
This issue only impacts QlikView. Other Qlik data analytics products including Qlik Cloud and Qlik Sense Enterprise on Windows are not impacted.

Additional Details


The Security Notice label is used to notify customers about security patches and upgrades that require a customer’s action. Please subscribe to the ‘Security Notice’ label to be notified of future updates. 

Frequently Asked Questions

Q: Is the vulnerability present in the QlikView Plugin or other QlikView products? 
A: The vulnerability is related to the MSI files on disk.

Q: Will deleting the MSI files mitigate the issue?
A: Qlik does not consider removing the MSI files a complete workaround. A server user can restore them.

44 Comments
to759_PM
Contributor II
Contributor II

@Sonja_Bauernfeind 

Impacted version number and fixed version numer are the same.

"All versions of QlikView prior to and including the releases below are impacted"

4,064 Views
Sonja_Bauernfeind
Digital Support
Digital Support

Hello @to759_PM That should already be resolved, thank you!

4,019 Views
AlexOmetis
Partner Ambassador
Partner Ambassador

Hi,

Can you confirm that this is only an issue when running an install or upgrade rather than an ongoing issue in an already-installed environment? Or is there a component of the installer that can be leveraged (perhaps via uninstaller) to expose this? 

Thanks

3,960 Views
Sonja_Bauernfeind
Digital Support
Digital Support

Hello @AlexOmetis 

Let me get clarity on this for you.

All the best,
Sonja 

3,884 Views
AlexOmetis
Partner Ambassador
Partner Ambassador

Looking at the Release Notes which lists the bug, it seems it's to do with leaving MSI files on disk that would be accessible to non-admins... which I guess means it affects existing installs too. Although this doesn't sound like a "race condition" as described in the security bulletin.

QV-25114

Local Privilege Escalation

Installers sometimes left .msi files on Local disc, which could result in a security problem. This is now fixed, so that administrator rights are needed to access them.

3,872 Views
AlexOmetis
Partner Ambassador
Partner Ambassador

Also clarity on whether it affects QlikView Server AND QlikView Desktop or just one or the other would be useful.

3,729 Views
Sonja_Bauernfeind
Digital Support
Digital Support

Hello @AlexOmetis 

We're actively looking into your questions. The internal ID for the investigation is QB-25717.

All the best,
Sonja 

3,218 Views
sis
Partner - Specialist
Partner - Specialist

@Sonja_Bauernfeind 

What kind of events can be caused by being able to run with administrator privileges?
For example, is it possible for the system to be stopped or destroyed without permission?

Thanks.

3,083 Views
Sonja_Bauernfeind
Digital Support
Digital Support

@sis Adding your question to our investigation.

2,988 Views
xudo
Contributor II
Contributor II

In the email of our Qlik partner is stated "If successfully exploited, a user with existing access to the Windows environment running QlikView or the QlikView plugin may be able to escalate their privileges to that of administrator."

What is meant here with "QlikView plugin"? Is there a vulnerability related to this plugin?

2,884 Views