Description
In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129, a low-privileged user that does not hold the ‘admin’ or ‘power’ Splunk roles could cause a Denial of Service by exploiting the `coldToFrozen.sh` script in the `splunk_archiver` app to rename critical Splunk directories, making the instance non-functional.<br><br>The Denial of Service is possible because of missing input validation in the `coldToFrozen.sh` script, which accepts arbitrary file paths and renames them without restricting operations to safe directories.
Published: 2026-05-20
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A low-privileged user that does not hold the ‘admin’ or ‘power’ Splunk roles can trigger a denial of service by abusing the coldToFrozen.sh script in the splunk_archiver app, which renames critical Splunk directories without enforcing input validation. The flaw allows arbitrary file path manipulation, enabling the attacker to modify essential directories and render the Splunk instance inoperable. The weakness corresponds to CWE-20, representing an insecure input validation failure.

Affected Systems

Splunk Enterprise versions prior to 10.2.2, 10.0.5, 9.4.11, and 9.3.12, as well as Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129 are vulnerable to this denial‑of‑service attack.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity risk; the EPSS score is unavailable and the vulnerability does not appear in CISA’s KEV catalog. Based on the description, the likely attack vector is local, requiring an attacker to have a low‑privileged user account on the affected Splunk instance. Once exploited, the attacker can permanently leave the system non‑functional until remediation is performed. The lack of input validation in the script allows renaming of arbitrary directories, a typical compromise of availability.

Generated by OpenCVE AI on May 20, 2026 at 18:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Splunk Enterprise patch (10.2.2 or later) to remove the vulnerable script.
  • Apply the latest Splunk Cloud Platform patch (10.4.2603.1 or later) to ensure all critical directories are protected.
  • As a temporary measure, delete or rename the coldToFrozen.sh script in the splunk_archiver app and disable the app until a patch has been applied.

Generated by OpenCVE AI on May 20, 2026 at 18:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise
Vendors & Products Splunk
Splunk splunk Cloud Platform
Splunk splunk Enterprise

Wed, 20 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129, a low-privileged user that does not hold the ‘admin’ or ‘power’ Splunk roles could cause a Denial of Service by exploiting the `coldToFrozen.sh` script in the `splunk_archiver` app to rename critical Splunk directories, making the instance non-functional.<br><br>The Denial of Service is possible because of missing input validation in the `coldToFrozen.sh` script, which accepts arbitrary file paths and renames them without restricting operations to safe directories.
Title Denial of Service through coldToFrozen.sh Script in Splunk Enterprise
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Splunk Splunk Cloud Platform Splunk Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-20T17:47:46.372Z

Reserved: 2025-10-08T11:59:15.400Z

Link: CVE-2026-20240

cve-icon Vulnrichment

Updated: 2026-05-20T17:47:37.105Z

cve-icon NVD

Status : Received

Published: 2026-05-20T18:16:26.637

Modified: 2026-05-20T18:16:26.637

Link: CVE-2026-20240

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T19:15:16Z

Weaknesses