Qlik, a leading software company, has recently made a concerning discovery regarding critical vulnerabilities in its Qlik Sense Enterprise for Windows software. These vulnerabilities, if exploited, could result in remote code execution (RCE), posing a serious security risk to systems running Qlik Sense Enterprise for Windows.
The security flaws were identified during Qlik’s internal security testing, highlighting the potential for cyber attackers to take control of servers, execute unauthorized commands, and compromise data confidentiality and integrity. While no reports of malicious exploitation have been confirmed yet, the urgency to address these vulnerabilities remains paramount to prevent any potential security breaches.
To address these vulnerabilities effectively, Qlik promptly released security patches to mitigate the risks and uphold system integrity. It is imperative for users to take immediate action by upgrading to the fixed versions of Qlik Sense Enterprise for Windows to ensure the security and stability of their systems.
The specific vulnerabilities that have been identified include Remote Code Execution (RCE) via Connectors and Broken Access Control (BAC). These vulnerabilities, categorized with high severity ratings, could allow unprivileged users with network access to trigger the execution of arbitrary executable files and unauthorized remote commands, respectively.
Users of the affected software versions, such as May 2024 Patch 9, February 2024 Patch 13, November 2023 Patch 15, August 2023 Patch 15, May 2023 Patch 17, and February 2023 Patch 14, are urged to install the recommended updates to address these vulnerabilities effectively. These updates, including November 2024 Initial Release, May 2024 Patch 10, February 2024 Patch 14, November 2023 Patch 16, August 2023 Patch 16, May 2023 Patch 18, and February 2023 Patch 15, have been designed to resolve the identified issues and enhance system security.
Furthermore, a workaround has been provided for extension and visualization errors by modifying the Repository configuration file. This temporary solution can be implemented either before or after the system upgrade to address any visualization-related challenges users may be experiencing.
To protect systems from potential exploitation, users are advised to download the patched versions from the official Qlik Download page, with a customer login required for access. It is crucial for customers to apply these updates promptly and seek assistance from Qlik Support if needed to prevent any compromise of their Qlik Sense Enterprise servers.
In conclusion, the proactive implementation of these security measures is essential to safeguard systems against potential cyber threats. By prioritizing system updates and security patches, users can mitigate the risks associated with the identified vulnerabilities and ensure the continued protection and reliability of their Qlik Sense Enterprise for Windows software.

