PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-48365 Qlik CVE debrief

CVE-2023-48365 is a Qlik Sense HTTP Tunneling Vulnerability that CISA added to its Known Exploited Vulnerabilities catalog on 2025-01-13. The supplied KEV record marks known ransomware campaign use as "Known," so this should be treated as actively exploited and prioritized for immediate mitigation.

Vendor
Qlik
Product
Sense
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2025-01-13
Original CVE updated
2025-01-13
Advisory published
2025-01-13
Advisory updated
2025-01-13

Who should care

Qlik Sense administrators, security teams, and asset owners running Qlik Sense, especially where the service is externally reachable or cannot be quickly isolated. Organizations with ransomware response concerns should prioritize this issue because the supplied KEV metadata flags known ransomware campaign use.

Technical summary

The provided corpus identifies the issue as a "Qlik Sense HTTP Tunneling Vulnerability" but does not include deeper technical detail beyond the vulnerability name. CISA’s KEV entry indicates the vulnerability is known to be exploited in the wild, and the KEV metadata directs defenders to apply vendor mitigations or discontinue use of the product if mitigations are unavailable.

Defensive priority

Urgent. The vulnerability is listed in CISA KEV with a required action and a due date of 2025-02-03 in the supplied timeline, which indicates immediate remediation priority for exposed systems.

Recommended defensive actions

  • Check whether any Qlik Sense deployments match the affected product scope in your environment.
  • Apply vendor-recommended mitigations or fixes referenced by the official Qlik support guidance linked from the KEV notes.
  • If mitigations are unavailable, follow CISA’s guidance and discontinue use of the product until a safe path is available.
  • Reduce exposure of Qlik Sense services while remediation is in progress, especially on internet-facing systems.
  • Validate remediation by confirming the affected service is updated or otherwise protected according to vendor instructions.

Evidence notes

This debrief is based only on the supplied CISA KEV record and the official CVE/NVD links. The corpus provides the vulnerability name, KEV inclusion date, due date, and the note that known ransomware campaign use is "Known." It does not provide CVSS, exploit mechanics, or vendor patch details, so no additional technical claims are made here.

Official resources

Publicly listed by CISA in the Known Exploited Vulnerabilities catalog on 2025-01-13, with the supplied metadata marking known ransomware campaign use as Known.