In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability `change_authentication` could enumerate internal IP addresses and network ports when adding new search peers to a Splunk search head in a distributed environment.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 03 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability `change_authentication` could enumerate internal IP addresses and network ports when adding new search peers to a Splunk search head in a distributed environment.
Title Blind Server Side Request Forgery (SSRF) through Distributed Search Peers in Splunk Enterprise
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2025-12-03T17:00:59.450Z

Reserved: 2024-10-10T19:15:13.265Z

Link: CVE-2025-20388

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-03T17:15:51.427

Modified: 2025-12-03T17:15:51.427

Link: CVE-2025-20388

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.