Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20387: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. in Splunk Splunk Enterprise

0
High
VulnerabilityCVE-2025-20387cvecve-2025-20387
Published: Wed Dec 03 2025 (12/03/2025, 17:00:51 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Universal Forwarder for Windows versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory. This lets non-administrator users on the machine access the directory and all its contents.

AI-Powered Analysis

AILast updated: 12/10/2025, 18:32:56 UTC

Technical Analysis

CVE-2025-20387 is a vulnerability affecting Splunk Universal Forwarder for Windows in versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10. The issue stems from the product assigning overly permissive access rights to the Universal Forwarder installation directory during new installations or upgrades. Specifically, non-administrator users on the local machine can gain read and write access to this directory and all its contents, which are security-critical resources. This misconfiguration allows unintended actors with limited privileges to potentially read sensitive configuration files, modify binaries or scripts, and thus compromise the forwarder's operation or escalate privileges. The vulnerability requires local access with low privileges and some user interaction, but no administrative rights are needed, making it easier for insider threats or malware with limited access to exploit. The CVSS 3.1 score of 8.0 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and network vector. Although no public exploits are currently known, the vulnerability poses a significant risk to environments relying on Splunk Universal Forwarder for log collection and monitoring. The affected versions span multiple recent releases, indicating a broad exposure. The vulnerability was publicly disclosed on December 3, 2025, with no patch links provided yet, suggesting organizations must monitor vendor updates closely or implement interim mitigations.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive log data, tampering with log forwarding processes, or disruption of monitoring capabilities, undermining security operations and compliance efforts. Attackers exploiting this flaw could manipulate logs to hide malicious activities or inject malicious code into the forwarder, potentially pivoting to other systems. Critical sectors such as finance, healthcare, energy, and government agencies that rely heavily on Splunk for security monitoring are at heightened risk. The compromise of log integrity and availability can delay incident detection and response, increasing the likelihood and impact of broader cyberattacks. Additionally, regulatory requirements under GDPR and NIS Directive emphasize protecting monitoring infrastructure, so exploitation could lead to legal and reputational consequences. The vulnerability's local attack vector means that insider threats or malware with limited privileges are primary concerns. Given the widespread use of Windows endpoints in European enterprises, the scope of affected systems is substantial.

Mitigation Recommendations

Organizations should prioritize upgrading Splunk Universal Forwarder for Windows to versions 10.0.2, 9.4.6, 9.3.8, or 9.2.10 or later as soon as patches become available. Until patches are applied, administrators should manually audit and correct NTFS permissions on the Universal Forwarder installation directory to restrict access strictly to administrators and the Splunk service account. Employing endpoint protection solutions to detect and prevent unauthorized local privilege escalations or file modifications can reduce exploitation risk. Implement strict local user account management and limit the number of users with local access to Splunk servers. Monitoring file integrity of the installation directory and alerting on unexpected changes can provide early warning of exploitation attempts. Additionally, organizations should review and harden Splunk configurations to minimize the impact of potential compromise. Regularly reviewing logs for suspicious local user activity and conducting internal audits of Splunk deployments will help maintain security posture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69306fa787f844e8607995ee

Added to database: 12/3/2025, 5:13:11 PM

Last enriched: 12/10/2025, 6:32:56 PM

Last updated: 1/19/2026, 8:48:06 PM

Views: 196

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats