CVE-2026-20166: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise
In Splunk Enterprise versions below 10.2.1 and 10.0.4, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, and 10.0.2503.12, a low-privileged user that does not hold the "admin" or "power" Splunk roles could retrieve the Observability Cloud API access token through the Discover Splunk Observability Cloud app due to improper access control. This vulnerability does not affect Splunk Enterprise versions below 9.4.9 and 9.3.10 because the Discover Splunk Observability Cloud app does not come with Splunk Enterprise.
AI Analysis
Technical Summary
CVE-2026-20166 is an information disclosure vulnerability affecting Splunk Enterprise versions prior to 10.2.1 and 10.0.4, as well as specific versions of Splunk Cloud Platform. The issue arises from improper access control in the Discover Splunk Observability Cloud app, which allows low-privileged users—those lacking admin or power roles—to retrieve the Observability Cloud API access token. This token is sensitive as it grants access to Splunk's Observability Cloud services, potentially enabling unauthorized data access or manipulation. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). It does not impact earlier Splunk Enterprise versions (below 9.4.9 and 9.3.10) because the Discover app is not included in those releases. The CVSS v3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and results in limited confidentiality and integrity impact without affecting availability. No public exploits have been reported to date. The vulnerability was reserved in October 2025 and published in March 2026. Due to the nature of the token exposure, attackers with access to a low-privileged Splunk account could leverage the token to access or manipulate observability data, potentially leading to further compromise or data leakage within an organization’s monitoring infrastructure.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of the Observability Cloud API access token to low-privileged users. This token can be used to access observability data and services, which may include sensitive operational metrics, logs, and traces. Unauthorized access could enable attackers to gather intelligence about the target environment, manipulate monitoring data, or disrupt incident response efforts. While the vulnerability does not directly allow system compromise or availability disruption, the exposure of sensitive tokens can facilitate lateral movement or privilege escalation in complex environments. Organizations relying heavily on Splunk for observability and security monitoring could face increased risk of data leakage and reduced trust in their monitoring systems. The impact is particularly significant in environments where Splunk is integrated with critical infrastructure or where observability data is used for security analytics and compliance reporting.
Mitigation Recommendations
Organizations should upgrade affected Splunk Enterprise instances to version 10.2.1 or later and Splunk Cloud Platform to the fixed versions (10.2.2510.5, 10.1.2507.16, or 10.0.2503.12) as soon as possible. Until patches are applied, restrict access to the Discover Splunk Observability Cloud app to only trusted users with appropriate roles (admin or power roles). Review and tighten role-based access controls (RBAC) to ensure that low-privileged users cannot access sensitive applications or tokens. Monitor Splunk logs for unusual access patterns or token usage that could indicate exploitation attempts. Consider rotating the Observability Cloud API tokens after patching to invalidate any tokens potentially exposed. Additionally, implement network segmentation and least privilege principles to limit the exposure of Splunk management interfaces. Regularly audit Splunk configurations and installed apps to detect unauthorized changes or additions that could introduce similar risks.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, Japan, France, Netherlands, India, Singapore
CVE-2026-20166: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. in Splunk Splunk Enterprise
Description
In Splunk Enterprise versions below 10.2.1 and 10.0.4, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, and 10.0.2503.12, a low-privileged user that does not hold the "admin" or "power" Splunk roles could retrieve the Observability Cloud API access token through the Discover Splunk Observability Cloud app due to improper access control. This vulnerability does not affect Splunk Enterprise versions below 9.4.9 and 9.3.10 because the Discover Splunk Observability Cloud app does not come with Splunk Enterprise.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20166 is an information disclosure vulnerability affecting Splunk Enterprise versions prior to 10.2.1 and 10.0.4, as well as specific versions of Splunk Cloud Platform. The issue arises from improper access control in the Discover Splunk Observability Cloud app, which allows low-privileged users—those lacking admin or power roles—to retrieve the Observability Cloud API access token. This token is sensitive as it grants access to Splunk's Observability Cloud services, potentially enabling unauthorized data access or manipulation. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). It does not impact earlier Splunk Enterprise versions (below 9.4.9 and 9.3.10) because the Discover app is not included in those releases. The CVSS v3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and results in limited confidentiality and integrity impact without affecting availability. No public exploits have been reported to date. The vulnerability was reserved in October 2025 and published in March 2026. Due to the nature of the token exposure, attackers with access to a low-privileged Splunk account could leverage the token to access or manipulate observability data, potentially leading to further compromise or data leakage within an organization’s monitoring infrastructure.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of the Observability Cloud API access token to low-privileged users. This token can be used to access observability data and services, which may include sensitive operational metrics, logs, and traces. Unauthorized access could enable attackers to gather intelligence about the target environment, manipulate monitoring data, or disrupt incident response efforts. While the vulnerability does not directly allow system compromise or availability disruption, the exposure of sensitive tokens can facilitate lateral movement or privilege escalation in complex environments. Organizations relying heavily on Splunk for observability and security monitoring could face increased risk of data leakage and reduced trust in their monitoring systems. The impact is particularly significant in environments where Splunk is integrated with critical infrastructure or where observability data is used for security analytics and compliance reporting.
Mitigation Recommendations
Organizations should upgrade affected Splunk Enterprise instances to version 10.2.1 or later and Splunk Cloud Platform to the fixed versions (10.2.2510.5, 10.1.2507.16, or 10.0.2503.12) as soon as possible. Until patches are applied, restrict access to the Discover Splunk Observability Cloud app to only trusted users with appropriate roles (admin or power roles). Review and tighten role-based access controls (RBAC) to ensure that low-privileged users cannot access sensitive applications or tokens. Monitor Splunk logs for unusual access patterns or token usage that could indicate exploitation attempts. Consider rotating the Observability Cloud API tokens after patching to invalidate any tokens potentially exposed. Additionally, implement network segmentation and least privilege principles to limit the exposure of Splunk management interfaces. Regularly audit Splunk configurations and installed apps to detect unauthorized changes or additions that could introduce similar risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2025-10-08T11:59:15.390Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b198902f860ef9433d35ef
Added to database: 3/11/2026, 4:30:08 PM
Last enriched: 3/18/2026, 7:10:10 PM
Last updated: 4/26/2026, 12:15:44 AM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.