Description
In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold the "admin" or "power" Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file due to improper access control. This vulnerability could allow for the unauthorized disclosure of sensitive credentials.
Published: 2026-03-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Disclosure
Action: Apply Patch
AI Analysis

Impact

An improper access control flaw in Splunk Enterprise and Splunk Cloud Platform allows users without the admin or power roles to call a REST API that exposes the passwords.conf file. The data returned can contain hashed or plaintext password values, giving the adversary untrusted credentials from the system. This results in potential compromise of service accounts and downstream systems that rely on those credentials, increasing the depth of the breach.

Affected Systems

Splunk Enterprise versions earlier than 10.2.0, 10.0.3, 9.4.9, and 9.3.10 and Splunk Cloud Platform versions earlier than 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123 are affected. The vulnerability exists in the /splunkd/__raw/servicesNS/-/-/configs/conf-passwords REST endpoint and applies to all deployments of these products that use standard access controls.

Risk and Exploitability

The CVSS v3.1 score of 6.5 indicates moderate severity, and the EPSS score of less than 1% suggests exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog, reducing the likelihood of widespread, known exploitation. Nonetheless, an attacker who can authenticate as a low-privileged Splunk user can directly query the API endpoint and retrieve sensitive password data. The attack vector is inferred to be over the Splunk REST API (HTTP/HTTPS) and requires only application-level authentication, which most users possess.

Generated by OpenCVE AI on March 24, 2026 at 18:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Splunk Enterprise update (10.2.0 or later) or Splunk Cloud Platform update (10.2.2510.5 or later).
  • If a patch cannot be applied immediately, restrict the /splunkd/__raw/servicesNS/-/-/configs/conf-passwords endpoint to users with the admin or power role or disable the endpoint entirely.
  • Verify that all configured Splunk roles are correctly assigned and remove any users from roles that grant unwarranted access to the endpoint.
  • Perform a security audit of stored passwords to ensure no plaintext credentials remain in passwords.conf.

Generated by OpenCVE AI on March 24, 2026 at 18:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Splunk splunk
CPEs cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
Vendors & Products Splunk splunk

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise
Vendors & Products Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise

Wed, 11 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold the "admin" or "power" Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file due to improper access control. This vulnerability could allow for the unauthorized disclosure of sensitive credentials.
Title Sensitive Information Disclosure through Improper Access Control in Splunk Enterprise
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Splunk Splunk Splunk Cloud Platform Splunk Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-12T16:19:36.648Z

Reserved: 2025-10-08T11:59:15.389Z

Link: CVE-2026-20164

cve-icon Vulnrichment

Updated: 2026-03-12T15:40:42.504Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T17:16:56.783

Modified: 2026-03-24T17:13:12.757

Link: CVE-2026-20164

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:50:14Z

Weaknesses