Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20373: Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. in Splunk Splunk Add-on for Palo Alto Networks

0
Low
VulnerabilityCVE-2025-20373cvecve-2025-20373
Published: Wed Nov 26 2025 (11/26/2025, 17:59:06 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Add-on for Palo Alto Networks

Description

CVE-2025-20373 is a low-severity vulnerability in Splunk Add-on for Palo Alto Networks versions below 2. 0. 2 where client secrets are logged in plaintext within the internal index. Exploitation requires either local access to log files or administrative privileges to internal indexes, which are typically restricted to admin roles. This exposure could allow attackers with such access to obtain sensitive credentials, aiding further attacks or lateral movement. The vulnerability does not impact integrity or availability and requires high privileges, limiting its exploitability. European organizations using affected Splunk add-on versions should review and restrict internal index access and upgrade to patched versions. Countries with significant Splunk and Palo Alto Networks deployments and critical infrastructure monitoring are most at risk. Mitigation involves strict role-based access control, auditing internal index access, and applying updates promptly. The CVSS score of 2.

AI-Powered Analysis

AILast updated: 12/03/2025, 18:58:11 UTC

Technical Analysis

CVE-2025-20373 affects the Splunk Add-on for Palo Alto Networks versions below 2.0.2, where sensitive client secrets are inadvertently logged in plaintext within the _internal index during the configuration of new Data Security Accounts. This vulnerability arises because the add-on writes these secrets directly to log files accessible via the internal Splunk index, which is by default only accessible to users with administrative privileges. An attacker with local access to the system or administrative access to the internal index could extract these secrets, potentially enabling unauthorized access to Palo Alto Networks data or systems. However, exploitation requires either local system access or elevated Splunk privileges, which limits the attack surface. The vulnerability does not affect data integrity or system availability, and no user interaction is required. The CVSS 3.1 score of 2.7 (low) reflects the limited confidentiality impact and high privilege requirement. No known exploits are currently reported in the wild. The vulnerability highlights the importance of secure logging practices and strict role-based access controls within Splunk environments, especially when handling sensitive credentials.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality if an attacker gains administrative access to Splunk internal indexes or local system access. Exposure of client secrets could lead to unauthorized access to Palo Alto Networks integrations or data, potentially facilitating further compromise or data exfiltration. Organizations relying heavily on Splunk for security monitoring and Palo Alto Networks for network security may face increased risk if internal access controls are lax. Critical infrastructure sectors such as finance, energy, and government agencies in Europe, which often deploy these technologies, could be targeted for espionage or disruption. However, the requirement for high privileges and no direct impact on integrity or availability reduces the overall threat level. Still, the presence of sensitive credentials in logs represents a compliance and operational risk, especially under GDPR and other data protection regulations prevalent in Europe.

Mitigation Recommendations

European organizations should immediately review and restrict access to the Splunk internal index, ensuring only trusted administrator-level roles have access. Implement strict role-based access controls and audit logs for any access to internal indexes. Upgrade the Splunk Add-on for Palo Alto Networks to version 2.0.2 or later, where this logging issue is resolved. Avoid storing sensitive credentials in logs or plaintext files and consider encrypting any necessary sensitive data within logs. Regularly review Splunk configurations and user roles to minimize privilege creep. Employ network segmentation and host-based controls to limit local access to Splunk servers. Additionally, monitor for unusual access patterns to internal indexes and conduct periodic security assessments of Splunk deployments. Incorporate these controls into compliance frameworks to ensure adherence to European data protection standards.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692740e20de433ec09559d57

Added to database: 11/26/2025, 6:03:14 PM

Last enriched: 12/3/2025, 6:58:11 PM

Last updated: 1/11/2026, 8:18:28 PM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats