Description
In Splunk Enterprise versions below 10.2.1 and 10.0.4, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, and 10.0.2503.12, a low-privileged user that does not hold the "admin" or "power" Splunk roles could retrieve the Observability Cloud API access token through the Discover Splunk Observability Cloud app due to improper access control.

This vulnerability does not affect Splunk Enterprise versions below 9.4.9 and 9.3.10 because the Discover Splunk Observability Cloud app does not come with Splunk Enterprise.
Published: 2026-03-11
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

A low‑privileged user that does not have the "admin" or "power" Splunk roles can retrieve the Observeability Cloud API access token through the Discover Splunk Observability Cloud app. Improper access control allows this disclosure, which is a classic information‑disclosure weakness identified as CWE‑200. The exposed token could enable the attacker to make authenticated API calls and potentially access, modify, or exfiltrate data within the Splunk environment.

Affected Systems

The vulnerability affects Splunk Enterprise versions below 10.2.1 and 10.0.4, as well as Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, and 10.0.2503.12. Versions earlier than 9.4.9 for Enterprise and 9.3.10 are not affected because the Discover app is not included with those releases.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate severity, and the EPSS score of less than 1% reflects a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. An attacker only needs a low‑privileged account with access to the Splunk instance and the Discover app to obtain the token; no administrative privileges or remote code execution are required. This makes the attack relatively easy to execute for authenticated users but still limited in scope compared to higher‑privilege exploits.

Generated by OpenCVE AI on March 24, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Splunk Enterprise to version 10.2.1 or later, or to 10.0.4 or later.
  • Upgrade Splunk Cloud Platform to version 10.2.2510.5, 10.1.2507.16, or 10.0.2503.12.
  • Remove or disable the Discover Splunk Observability Cloud app on older instances if an immediate upgrade is not possible.
  • Restart Splunk services after applying the upgrade to ensure the new configuration is active.

Generated by OpenCVE AI on March 24, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Splunk splunk
CPEs cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk:10.2.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*
Vendors & Products Splunk splunk

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise
Vendors & Products Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise

Wed, 11 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 10.2.1 and 10.0.4, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, and 10.0.2503.12, a low-privileged user that does not hold the "admin" or "power" Splunk roles could retrieve the Observability Cloud API access token through the Discover Splunk Observability Cloud app due to improper access control. This vulnerability does not affect Splunk Enterprise versions below 9.4.9 and 9.3.10 because the Discover Splunk Observability Cloud app does not come with Splunk Enterprise.
Title Sensitive Information Disclosure in Discover Splunk Observability Cloud app for Splunk Enterprise
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Splunk Splunk Splunk Cloud Platform Splunk Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-12T16:19:30.880Z

Reserved: 2025-10-08T11:59:15.390Z

Link: CVE-2026-20166

cve-icon Vulnrichment

Updated: 2026-03-12T15:40:22.184Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T17:16:57.130

Modified: 2026-03-24T19:55:36.203

Link: CVE-2026-20166

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:50:13Z

Weaknesses