CVE-2026-20164: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold the "admin" or "power" Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file due to improper access control. This vulnerability could allow for the unauthorized disclosure of sensitive credentials.
AI Analysis
Technical Summary
CVE-2026-20164 is a vulnerability in Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, as well as corresponding versions of Splunk Cloud Platform, where a low-privileged user lacking admin or power roles can access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint. This endpoint improperly exposes sensitive information, specifically hashed or plaintext passwords stored in the passwords.conf configuration file. The root cause is insufficient access control on this REST API endpoint, allowing unauthorized users to retrieve credential data. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting network attack vector, low attack complexity, and low privileges required, with no user interaction needed. The impact is primarily on confidentiality, as attackers can obtain sensitive credentials that may be reused or cracked to escalate privileges or move laterally within an environment. Integrity and availability are not directly affected. No public exploits have been reported yet, but the exposure of credentials makes this a significant risk. The vulnerability affects a broad range of Splunk versions widely used in enterprise security monitoring and log management, making it a critical concern for organizations relying on Splunk for operational intelligence and security analytics.
Potential Impact
The unauthorized disclosure of sensitive credentials due to this vulnerability can have severe consequences for organizations globally. Attackers gaining access to hashed or plaintext passwords can attempt credential reuse or offline cracking, potentially escalating privileges within the Splunk environment or other connected systems. This can lead to unauthorized access to critical monitoring data, manipulation of logs, or disruption of security operations. Compromise of Splunk credentials may also facilitate lateral movement within enterprise networks, increasing the risk of broader breaches. Since Splunk is widely deployed in sectors such as finance, healthcare, government, and critical infrastructure, the impact extends to highly sensitive and regulated environments. The vulnerability undermines the confidentiality of security monitoring tools, which are foundational to detecting and responding to cyber threats, thereby weakening overall organizational security posture.
Mitigation Recommendations
Organizations should immediately upgrade affected Splunk Enterprise and Cloud Platform instances to versions 10.2.0 or later, or the corresponding patched Cloud Platform releases, as provided by Splunk. In environments where immediate patching is not feasible, administrators should restrict access to the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint through network segmentation, firewall rules, or Splunk role-based access controls to prevent low-privileged users from querying this endpoint. Review and tighten Splunk user roles and permissions to ensure that only trusted administrators have access to sensitive configuration data. Enable monitoring and alerting for unusual access patterns to this endpoint or attempts to retrieve configuration files. Additionally, consider rotating any exposed credentials and enforcing strong password policies to reduce the risk from potential credential compromise. Regularly audit Splunk configurations and logs to detect unauthorized access attempts. Finally, maintain up-to-date backups and incident response plans to quickly respond to potential exploitation.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Japan, Netherlands, Singapore, India
CVE-2026-20164: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold the "admin" or "power" Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file due to improper access control. This vulnerability could allow for the unauthorized disclosure of sensitive credentials.
AI-Powered Analysis
Technical Analysis
CVE-2026-20164 is a vulnerability in Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, as well as corresponding versions of Splunk Cloud Platform, where a low-privileged user lacking admin or power roles can access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint. This endpoint improperly exposes sensitive information, specifically hashed or plaintext passwords stored in the passwords.conf configuration file. The root cause is insufficient access control on this REST API endpoint, allowing unauthorized users to retrieve credential data. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting network attack vector, low attack complexity, and low privileges required, with no user interaction needed. The impact is primarily on confidentiality, as attackers can obtain sensitive credentials that may be reused or cracked to escalate privileges or move laterally within an environment. Integrity and availability are not directly affected. No public exploits have been reported yet, but the exposure of credentials makes this a significant risk. The vulnerability affects a broad range of Splunk versions widely used in enterprise security monitoring and log management, making it a critical concern for organizations relying on Splunk for operational intelligence and security analytics.
Potential Impact
The unauthorized disclosure of sensitive credentials due to this vulnerability can have severe consequences for organizations globally. Attackers gaining access to hashed or plaintext passwords can attempt credential reuse or offline cracking, potentially escalating privileges within the Splunk environment or other connected systems. This can lead to unauthorized access to critical monitoring data, manipulation of logs, or disruption of security operations. Compromise of Splunk credentials may also facilitate lateral movement within enterprise networks, increasing the risk of broader breaches. Since Splunk is widely deployed in sectors such as finance, healthcare, government, and critical infrastructure, the impact extends to highly sensitive and regulated environments. The vulnerability undermines the confidentiality of security monitoring tools, which are foundational to detecting and responding to cyber threats, thereby weakening overall organizational security posture.
Mitigation Recommendations
Organizations should immediately upgrade affected Splunk Enterprise and Cloud Platform instances to versions 10.2.0 or later, or the corresponding patched Cloud Platform releases, as provided by Splunk. In environments where immediate patching is not feasible, administrators should restrict access to the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint through network segmentation, firewall rules, or Splunk role-based access controls to prevent low-privileged users from querying this endpoint. Review and tighten Splunk user roles and permissions to ensure that only trusted administrators have access to sensitive configuration data. Enable monitoring and alerting for unusual access patterns to this endpoint or attempts to retrieve configuration files. Additionally, consider rotating any exposed credentials and enforcing strong password policies to reduce the risk from potential credential compromise. Regularly audit Splunk configurations and logs to detect unauthorized access attempts. Finally, maintain up-to-date backups and incident response plans to quickly respond to potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2025-10-08T11:59:15.389Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b198902f860ef9433d35e9
Added to database: 3/11/2026, 4:30:08 PM
Last enriched: 3/11/2026, 4:46:03 PM
Last updated: 3/14/2026, 3:07:12 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.