PatchSiren cyber security CVE debrief
CVE-2023-48365 Qlik CVE debrief
CVE-2023-48365 is a Qlik Sense HTTP Tunneling Vulnerability that CISA added to its Known Exploited Vulnerabilities catalog on 2025-01-13. The supplied KEV record marks known ransomware campaign use as "Known," so this should be treated as actively exploited and prioritized for immediate mitigation.
- Vendor
- Qlik
- Product
- Sense
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2025-01-13
- Original CVE updated
- 2025-01-13
- Advisory published
- 2025-01-13
- Advisory updated
- 2025-01-13
Who should care
Qlik Sense administrators, security teams, and asset owners running Qlik Sense, especially where the service is externally reachable or cannot be quickly isolated. Organizations with ransomware response concerns should prioritize this issue because the supplied KEV metadata flags known ransomware campaign use.
Technical summary
The provided corpus identifies the issue as a "Qlik Sense HTTP Tunneling Vulnerability" but does not include deeper technical detail beyond the vulnerability name. CISA’s KEV entry indicates the vulnerability is known to be exploited in the wild, and the KEV metadata directs defenders to apply vendor mitigations or discontinue use of the product if mitigations are unavailable.
Defensive priority
Urgent. The vulnerability is listed in CISA KEV with a required action and a due date of 2025-02-03 in the supplied timeline, which indicates immediate remediation priority for exposed systems.
Recommended defensive actions
- Check whether any Qlik Sense deployments match the affected product scope in your environment.
- Apply vendor-recommended mitigations or fixes referenced by the official Qlik support guidance linked from the KEV notes.
- If mitigations are unavailable, follow CISA’s guidance and discontinue use of the product until a safe path is available.
- Reduce exposure of Qlik Sense services while remediation is in progress, especially on internet-facing systems.
- Validate remediation by confirming the affected service is updated or otherwise protected according to vendor instructions.
Evidence notes
This debrief is based only on the supplied CISA KEV record and the official CVE/NVD links. The corpus provides the vulnerability name, KEV inclusion date, due date, and the note that known ransomware campaign use is "Known." It does not provide CVSS, exploit mechanics, or vendor patch details, so no additional technical claims are made here.
Official resources
-
CVE-2023-48365 CVE record
CVE.org
-
CVE-2023-48365 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
Publicly listed by CISA in the Known Exploited Vulnerabilities catalog on 2025-01-13, with the supplied metadata marking known ransomware campaign use as Known.