SB2026031320 - Information disclosure in Splunk Enterprise
Published: March 13, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Inclusion of sensitive information in log files (CVE-ID: CVE-2026-20165)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to the MongoClient logging channel stores sensitive information into log files. A remote user can retrieve sensitive information by inspecting the job’s search log.
2) Improper access control (CVE-ID: CVE-2026-20164)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote user can access the "/splunkd/__raw/servicesNS/-/-/configs/conf-passwords" REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file
Remediation
Install update from vendor's website.