Vulnerability identifier: #VU106069
Vulnerability risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-284
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Splunk Enterprise
Server applications /
IDS/IPS systems, Firewalls and proxy servers
Splunk Secure Gateway
Server applications /
Remote management servers, RDP, SSH
Vendor: Splunk Inc.
Description
The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and edit or delete other user data in App Key Value Store (KVStore) collections that the Splunk Secure Gateway app created.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Splunk Enterprise: 9.0.9 - 9.0.10, 9.1.3 - 9.1.7, 9.2.0 - 9.2.4, 9.3.0 - 9.3.2, 9.4.0
Splunk Secure Gateway: before 3.7.23
External links
https://advisory.splunk.com/advisories/SVD-2025-0307
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.