Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2025-1105 |
|
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk
Splunk splunk |
|
| Vendors & Products |
Splunk
Splunk splunk |
Wed, 26 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add-on exposes client secrets in plain text in the _internal index during the addition of new “Data Security Accounts“. The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) in the Splunk documentation for more information. | |
| Title | Sensitive Information Disclosure in “_internal“ index through Splunk Add-On for Palo Alto Networks | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-11-26T18:28:46.500Z
Reserved: 2024-10-10T19:15:13.262Z
Link: CVE-2025-20373
Updated: 2025-11-26T18:28:40.258Z
Status : Awaiting Analysis
Published: 2025-11-26T18:15:48.137
Modified: 2025-12-01T15:39:53.100
Link: CVE-2025-20373
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:26:34Z