Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20387: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. in Splunk Splunk Enterprise

0
High
VulnerabilityCVE-2025-20387cvecve-2025-20387
Published: Wed Dec 03 2025 (12/03/2025, 17:00:51 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Universal Forwarder for Windows versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory. This lets non-administrator users on the machine access the directory and all its contents.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:50:43 UTC

Technical Analysis

CVE-2025-20387 is a vulnerability affecting Splunk Universal Forwarder for Windows versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10. The issue stems from improper permission settings on the Universal Forwarder installation directory following a fresh install or upgrade. Specifically, the directory and its contents are assigned permissions that allow non-administrator users on the local machine to access and potentially modify files that should be restricted. This misconfiguration can expose security-critical resources, enabling unauthorized actors with limited privileges to read sensitive data or alter configuration and executable files. Such unauthorized modifications could lead to privilege escalation, data leakage, or disruption of Splunk's logging and monitoring capabilities. The vulnerability requires local access with limited privileges and user interaction during installation or upgrade, which somewhat limits remote exploitation but still poses a significant risk in multi-user or shared environments. The CVSS v3.1 score of 8.0 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and limited privileges required. Although no active exploits are reported, the vulnerability's nature makes it a critical concern for organizations relying on Splunk Universal Forwarder on Windows systems. Remediation involves updating to fixed versions (10.0.2, 9.4.6, 9.3.8, or 9.2.10) and auditing file system permissions post-installation or upgrade to ensure proper access controls are enforced.

Potential Impact

The vulnerability can lead to unauthorized disclosure of sensitive log data, unauthorized modification of Splunk configuration or executable files, and potential disruption of log forwarding services. This compromises the confidentiality, integrity, and availability of the Splunk Universal Forwarder, which is critical for security monitoring and incident response. Attackers with local access but limited privileges could exploit this to escalate privileges or tamper with security monitoring data, undermining trust in security operations. Organizations relying on Splunk for centralized logging and security analytics may face increased risk of undetected intrusions or data breaches. The impact is especially severe in environments where multiple users share the same Windows system or where endpoint security is critical. Additionally, the vulnerability may facilitate lateral movement or persistence by adversaries who gain limited local access. Overall, the threat undermines the security posture of affected organizations and could lead to regulatory compliance issues if sensitive data is exposed or logs are manipulated.

Mitigation Recommendations

1. Immediately upgrade Splunk Universal Forwarder for Windows to versions 10.0.2, 9.4.6, 9.3.8, or 9.2.10 where the vulnerability is fixed. 2. After installation or upgrade, manually verify and correct NTFS permissions on the Universal Forwarder installation directory to restrict access strictly to administrators and the Splunk service account. 3. Implement strict local user account management policies to limit the number of users with local access on systems running Splunk Universal Forwarder. 4. Use application whitelisting and endpoint protection to detect unauthorized modifications to Splunk files. 5. Monitor file integrity of Splunk installation directories using host-based intrusion detection systems (HIDS). 6. Educate system administrators to be cautious during upgrades and to validate permissions post-upgrade. 7. Where possible, isolate Splunk Universal Forwarder hosts to minimize exposure to untrusted users. 8. Review and harden Windows security policies related to file system permissions and user rights assignments. 9. Maintain up-to-date backups of Splunk configurations and logs to enable recovery in case of tampering.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69306fa787f844e8607995ee

Added to database: 12/3/2025, 5:13:11 PM

Last enriched: 2/27/2026, 4:50:43 AM

Last updated: 3/24/2026, 12:59:20 AM

Views: 214

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses