#VU106069 Improper access control in Splunk Enterprise and Splunk Secure Gateway - CVE-2025-20230


Vulnerability identifier: #VU106069

Vulnerability risk: Medium

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-20230

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Splunk Enterprise
Server applications / IDS/IPS systems, Firewalls and proxy servers
Splunk Secure Gateway
Server applications / Remote management servers, RDP, SSH

Vendor: Splunk Inc.

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and edit or delete other user data in App Key Value Store (KVStore) collections that the Splunk Secure Gateway app created.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Splunk Enterprise: 9.0.9 - 9.0.10, 9.1.3 - 9.1.7, 9.2.0 - 9.2.4, 9.3.0 - 9.3.2, 9.4.0

Splunk Secure Gateway: before 3.7.23


External links
https://advisory.splunk.com/advisories/SVD-2025-0307


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability