SB2026021961 - Two information disclosure vulnerabilities in Splunk Enterprise



SB2026021961 - Two information disclosure vulnerabilities in Splunk Enterprise

Published: February 19, 2026

Security Bulletin ID SB2026021961
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Adjecent network
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Unprotected storage of credentials (CVE-ID: CVE-2026-20138)

The vulnerability allows a remote user to gain access to other users' credentials.

The vulnerability exists due to application stored credentials in plain text. A remote user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk _internal index can view in plain text the integrationKey, secretKey, and appSecretKey secrets, generated by Duo Two-Factor Authentication for Splunk Enterprise.


2) Cleartext storage of sensitive information (CVE-ID: CVE-2026-20142)

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to application stores sensitive information in configuration files. A remote user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk _internal index can view in plain text the RSA accessKey value from the Authentication.conf file.


Remediation

Install update from vendor's website.