Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20142: Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. in Splunk Splunk Enterprise

0
Medium
VulnerabilityCVE-2026-20142cvecve-2026-20142
Published: Wed Feb 18 2026 (02/18/2026, 16:45:37 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the RSA `accessKey` value from the [<u>Authentication.conf</u> ](https://help.splunk.com/en/splunk-enterprise/administer/admin-manual/10.2/configuration-file-reference/10.2.0-configuration-file-reference/authentication.conf)file, in plain text.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:27:24 UTC

Technical Analysis

CVE-2026-20142 is a vulnerability affecting multiple versions of Splunk Enterprise (below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11) where sensitive information is improperly logged in plaintext within the _internal index of a Splunk Search Head Cluster (SHC) deployment. Specifically, the RSA accessKey value from the authentication.conf configuration file is exposed. This key is critical for authentication processes and its exposure can provide attackers with valuable information to compromise the system further. The vulnerability arises due to insufficient protection of sensitive data in log files, categorized under CWE-532 (Information Exposure Through Log Files). Exploitation requires a user to have a role with access to the _internal index, which typically implies some level of privileged access, but no user interaction is needed. The CVSS 3.1 score of 6.8 reflects a medium severity with high confidentiality, integrity, and availability impacts, but limited attack vector scope (adjacent network) and requiring privileges. No public exploits are known at this time, but the exposure of cryptographic keys in logs is a significant risk that could facilitate lateral movement or privilege escalation within affected environments.

Potential Impact

The exposure of the RSA accessKey in plaintext within logs can lead to serious security consequences for organizations using affected Splunk Enterprise versions. An attacker with access to the _internal index could retrieve this key and potentially impersonate legitimate authentication processes, leading to unauthorized access, data breaches, or manipulation of log data and system configurations. This compromises confidentiality, integrity, and availability of the Splunk environment and potentially connected systems. Given Splunk's widespread use in security monitoring and operational intelligence, exploitation could undermine trust in security monitoring, delay incident response, and enable attackers to hide their activities. Organizations relying on Splunk for critical security functions may face increased risk of data exfiltration, insider threats, and compliance violations if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2026-20142, organizations should upgrade Splunk Enterprise to versions 10.2.0, 10.0.2, 9.4.7, 9.3.9, or 9.2.11 or later, where this issue is resolved. Until upgrades can be applied, restrict access to the _internal index to only the minimum necessary roles, ensuring that only trusted administrators have access. Review and audit roles with _internal index permissions to detect any unnecessary privileges. Implement strict monitoring and alerting on access to sensitive logs and configuration files. Consider encrypting sensitive configuration files and keys where possible, and avoid logging sensitive authentication keys in plaintext. Regularly review Splunk logs for signs of unauthorized access or suspicious activity. Additionally, enforce network segmentation and strong authentication controls to limit the attack surface. Finally, educate administrators about the risks of exposing sensitive keys in logs and the importance of applying security patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.382Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69969ef76aea4a407a3d9a7e

Added to database: 2/19/2026, 5:26:15 AM

Last enriched: 2/27/2026, 8:27:24 AM

Last updated: 4/9/2026, 1:54:37 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses