Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20138: Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. in Splunk Splunk Enterprise

0
Medium
VulnerabilityCVE-2026-20138cvecve-2026-20138
Published: Wed Feb 18 2026 (02/18/2026, 16:45:33 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the `integrationKey`, `secretKey`, and `appSecretKey` secrets, generated by [Duo Two-Factor Authentication for Splunk Enterprise](https://duo.com/docs/splunk), in plain text.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:27:11 UTC

Technical Analysis

CVE-2026-20138 is a vulnerability identified in multiple versions of Splunk Enterprise prior to 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, specifically impacting Search Head Cluster (SHC) deployments. The issue stems from sensitive authentication secrets generated by the Duo Two-Factor Authentication app for Splunk Enterprise being logged in plaintext within the _internal Splunk index. Users who have roles permitting access to this internal index can retrieve critical secrets such as integrationKey, secretKey, and appSecretKey directly from log files. These keys are essential for the operation and security of Duo 2FA, and their exposure can allow an attacker with legitimate access to potentially bypass or compromise two-factor authentication mechanisms. The vulnerability is categorized under CWE-532, which relates to the exposure of sensitive information through logs. Exploitation requires authenticated access to the Splunk SHC environment but no additional user interaction. The CVSS 3.1 base score of 6.8 reflects a medium severity with high impact on confidentiality, integrity, and availability, but limited by the need for privileged access. No public exploits have been reported yet, but the risk remains significant given the sensitive nature of the exposed secrets. The vulnerability affects multiple major versions of Splunk Enterprise, emphasizing the need for patching or mitigating controls in affected environments.

Potential Impact

The exposure of Duo 2FA secrets in plaintext logs can severely undermine the security posture of organizations using Splunk Enterprise with Duo integration. Attackers or malicious insiders with access to the _internal index can extract these keys and potentially bypass two-factor authentication, leading to unauthorized access to critical systems and data. This compromises confidentiality by revealing sensitive authentication credentials, integrity by enabling unauthorized actions, and availability if attackers disrupt authentication processes. The vulnerability is particularly impactful in environments with multiple administrators or analysts who have access to internal logs, increasing the attack surface. Organizations relying on Splunk for security monitoring and incident response may face increased risk of lateral movement and privilege escalation if these secrets are compromised. Although exploitation requires authenticated access, the ease of extracting secrets from logs makes this a significant risk for insider threats or attackers who have gained limited footholds. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Overall, this vulnerability can lead to severe breaches of trust and control in enterprise security environments.

Mitigation Recommendations

To mitigate CVE-2026-20138, organizations should prioritize upgrading Splunk Enterprise to versions 10.2.0, 10.0.2, 9.4.7, 9.3.9, or 9.2.11 and later, where this issue is resolved. Until patches are applied, restrict access to the _internal index strictly to trusted administrators with a clear need, minimizing the number of users who can view sensitive logs. Implement strict role-based access controls (RBAC) and audit access to internal indexes to detect any unauthorized attempts to view sensitive information. Review and sanitize log configurations to prevent logging of sensitive keys or secrets, and consider encrypting log data at rest and in transit. Additionally, rotate Duo 2FA keys if exposure is suspected to invalidate compromised secrets. Monitor Splunk logs and user activities for unusual access patterns or attempts to extract sensitive data. Educate administrators about the risks of exposing secrets in logs and enforce secure logging practices. Finally, consider isolating Duo 2FA integration components and limiting their logging verbosity to reduce sensitive data exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.381Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69969ef76aea4a407a3d9a7b

Added to database: 2/19/2026, 5:26:15 AM

Last enriched: 2/27/2026, 8:27:11 AM

Last updated: 4/9/2026, 8:04:44 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses