SB2026041757 - Splunk Enterprise update for third-party components



SB2026041757 - Splunk Enterprise update for third-party components

Published: April 17, 2026

Security Bulletin ID SB2026041757
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 80% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Uncontrolled recursion (CVE-ID: CVE-2026-0994)

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to uncontrolled recursion in within the google.protobuf.json_format.ParseDict(). A remote attacker can pass specially crafted input to the application and perform a denial of service attack. 


2) Type confusion (CVE-ID: CVE-2026-22796)

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to a type confusion error within the PKCS7_digest_from_attributes() function. A remote attacker can pass specially crafted PKCS#7 data to the application, trigger a type confusion error and perform a denial of service attack.


3) Missing authorization (CVE-ID: CVE-2025-12817)

The vulnerability allows a remote user to perform a denial of service attack.

The vulnerability exists due to missing authorization in the  CREATE STATISTICS command. A remote user can perform denial of service against other CREATE STATISTICS users by creating in any schema.


4) Integer overflow (CVE-ID: CVE-2025-12818)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in multiple PostgreSQL libpq client library functions. A remote user can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Deserialization of Untrusted Data (CVE-ID: CVE-2026-21226)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data in Azure Core shared client library for Python. A remote user can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.