Description
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the `integrationKey`, `secretKey`, and `appSecretKey` secrets, generated by [Duo Two-Factor Authentication for Splunk Enterprise](https://duo.com/docs/splunk), in plain text.
Published: 2026-02-18
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Disclosure
Action: Apply Patch
AI Analysis

Impact

A privilege misuse flaw in Splunk Enterprise allows a user of a Search Head Cluster who has a role that can access the internal index to read sensitive Duo Two-Factor Authentication secrets such as integrationKey, secretKey, and appSecretKey in plain text. This results in exposure of credentials that could be used to compromise the associated services or to impersonate authenticated users. The weakness is classified as CWE-532, indicating insecure logging of sensitive information.

Affected Systems

Splunk Enterprise software versions lower than 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11 are susceptible. The vulnerability is limited to deployments that include a Search Head Cluster and roles that grant read access to the internal index.

Risk and Exploitability

The CVSS base score is 6.8, indicating a medium to potentially high impact. EPSS is listed as < 1%, suggesting that active exploitation is currently rare. The vulnerability is not listed in the CISA KEV catalog. Likely attack conditions require a user with appropriate internal index permissions, meaning the attack vector is role-based access within the SHC. With these privileges, an attacker can enumerate the exposed secrets, enabling potential lateral movement or service disruption.

Generated by OpenCVE AI on April 17, 2026 at 18:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Splunk Enterprise to any release equal to or newer than 10.2.0, 10.0.2, 9.4.7, 9.3.9, or 9.2.11 that contains the security fix.
  • Revoke or restrict role permissions that allow access to the internal index until the application has been updated.
  • Update Duo Two‑Factor Authentication for Splunk to the latest available version and immediately rotate any exposed keys.

Generated by OpenCVE AI on April 17, 2026 at 18:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Splunk splunk
CPEs cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
Vendors & Products Splunk splunk

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk splunk Enterprise
Vendors & Products Splunk
Splunk splunk Enterprise

Wed, 18 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the `integrationKey`, `secretKey`, and `appSecretKey` secrets, generated by [Duo Two-Factor Authentication for Splunk Enterprise](https://duo.com/docs/splunk), in plain text.
Title Sensitive Information Disclosure in "_internal" index in Splunk Enterprise
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Splunk Splunk Splunk Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-26T14:44:16.462Z

Reserved: 2025-10-08T11:59:15.381Z

Link: CVE-2026-20138

cve-icon Vulnrichment

Updated: 2026-02-18T17:43:59.754Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T18:24:23.427

Modified: 2026-02-20T13:50:05.057

Link: CVE-2026-20138

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:45:25Z

Weaknesses