Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20164: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise

0
Medium
VulnerabilityCVE-2026-20164cvecve-2026-20164
Published: Wed Mar 11 2026 (03/11/2026, 16:18:01 UTC)
Source: CVE Database V5
Vendor/Project: Splunk
Product: Splunk Enterprise

Description

In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold the "admin" or "power" Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file due to improper access control. This vulnerability could allow for the unauthorized disclosure of sensitive credentials.

AI-Powered Analysis

AILast updated: 03/11/2026, 16:46:03 UTC

Technical Analysis

CVE-2026-20164 is a vulnerability in Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, as well as corresponding versions of Splunk Cloud Platform, where a low-privileged user lacking admin or power roles can access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint. This endpoint improperly exposes sensitive information, specifically hashed or plaintext passwords stored in the passwords.conf configuration file. The root cause is insufficient access control on this REST API endpoint, allowing unauthorized users to retrieve credential data. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting network attack vector, low attack complexity, and low privileges required, with no user interaction needed. The impact is primarily on confidentiality, as attackers can obtain sensitive credentials that may be reused or cracked to escalate privileges or move laterally within an environment. Integrity and availability are not directly affected. No public exploits have been reported yet, but the exposure of credentials makes this a significant risk. The vulnerability affects a broad range of Splunk versions widely used in enterprise security monitoring and log management, making it a critical concern for organizations relying on Splunk for operational intelligence and security analytics.

Potential Impact

The unauthorized disclosure of sensitive credentials due to this vulnerability can have severe consequences for organizations globally. Attackers gaining access to hashed or plaintext passwords can attempt credential reuse or offline cracking, potentially escalating privileges within the Splunk environment or other connected systems. This can lead to unauthorized access to critical monitoring data, manipulation of logs, or disruption of security operations. Compromise of Splunk credentials may also facilitate lateral movement within enterprise networks, increasing the risk of broader breaches. Since Splunk is widely deployed in sectors such as finance, healthcare, government, and critical infrastructure, the impact extends to highly sensitive and regulated environments. The vulnerability undermines the confidentiality of security monitoring tools, which are foundational to detecting and responding to cyber threats, thereby weakening overall organizational security posture.

Mitigation Recommendations

Organizations should immediately upgrade affected Splunk Enterprise and Cloud Platform instances to versions 10.2.0 or later, or the corresponding patched Cloud Platform releases, as provided by Splunk. In environments where immediate patching is not feasible, administrators should restrict access to the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint through network segmentation, firewall rules, or Splunk role-based access controls to prevent low-privileged users from querying this endpoint. Review and tighten Splunk user roles and permissions to ensure that only trusted administrators have access to sensitive configuration data. Enable monitoring and alerting for unusual access patterns to this endpoint or attempts to retrieve configuration files. Additionally, consider rotating any exposed credentials and enforcing strong password policies to reduce the risk from potential credential compromise. Regularly audit Splunk configurations and logs to detect unauthorized access attempts. Finally, maintain up-to-date backups and incident response plans to quickly respond to potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.389Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b198902f860ef9433d35e9

Added to database: 3/11/2026, 4:30:08 PM

Last enriched: 3/11/2026, 4:46:03 PM

Last updated: 3/14/2026, 3:07:12 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses