- Description
- In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.<br><br>The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.
- Source
- psirt@cisco.com
- NVD status
- Analyzed
- Products
- splunk, splunk_secure_gateway
CVSS 3.1
- Type
- Primary
- Base score
- 5.7
- Impact score
- 3.6
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- psirt@cisco.com
- CWE-532
- Hype score
- Not currently trending
🚨 CVE-2025-20231 🔴 HIGH (7.1) 🏢 Splunk - Splunk Enterprise 🏗️ 9.4 🔗 https://t.co/rC0AMopJ9z #CyberCron #VulnAlert #InfoSec https://t.co/v8ZuldvjnI
@cybercronai
28 Mar 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical vulnerabilities in Splunk Enterprise and Cloud have been patched, addressing RCE and data leak risks (CVE-2025-20229, CVE-2025-20231). Organizations advised to check user access controls. 🛡️🔒 #Splunk #DataSecurity #USA link: https://t.co/eV3lC4exvt https://t.co/D7YyKk
@TweetThreatNews
27 Mar 2025
106 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
Protect your systems from CVE-2025-20231, apply latest updates for enhanced security
@LeBraunneZen
27 Mar 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20229 and CVE-2025-20231 impacts Splunk #Splunk #CVE-2025-20229 #CVE-2025-20231 https://t.co/4GQfmAvjLE
@pravin_karthik
27 Mar 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20231 detected, apply system updates immediately
@LeBraunneZen
27 Mar 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-20231 detected, apply system updates to prevent threats
@LeBraunneZen
27 Mar 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Splunkは、2件の高深刻度脆弱性(CVE-2025-20229およびCVE-2025-20231)に対するセキュリティアップデートを公開した。 CVE-2025-20229は、Splunk EnterpriseおよびSplunk Cloud Platformに影響するリモートコード実行脆弱性。
@yousukezan
27 Mar 2025
3004 Impressions
4 Retweets
18 Likes
5 Bookmarks
0 Replies
2 Quotes
Splunk Alert: RCE (CVE-2025-20229) and Data Leak (CVE-2025-20231) Vulnerabilities Threaten Platforms Splunk has released a security advisory detailing critical vulnerabilities affecting Splunk Enterprise and Splunk Cloud Platform. https://t.co/dnN9gD5QmW
@the_yellow_fall
27 Mar 2025
734 Impressions
4 Retweets
13 Likes
3 Bookmarks
0 Replies
0 Quotes
Enhance security now: CVE-2025-20231 detected, apply latest system updates to prevent potential threats
@LeBraunneZen
27 Mar 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
�� CVE-2025-20231 - Splunk Enterprise - HIGH 🚨 🗓️ Date published 2025-03-26 22:15:15 UTC #SplunkEnterprise #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/5rSc22YT2V
@vulns_space
26 Mar 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "49EE75F0-2AD6-4712-9E2A-C000A44E5605",
"versionEndExcluding": "9.1.8",
"versionStartIncluding": "9.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "5B7E20B1-E38E-4F5E-9F89-41FD4C231742",
"versionEndExcluding": "9.2.5",
"versionStartIncluding": "9.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "E66E66BA-AFC2-4E0A-B233-9E2C7D985AF0",
"versionEndExcluding": "9.3.3",
"versionStartIncluding": "9.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk:9.4.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "AD39F156-52DB-4F43-8528-37500E3AEB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_secure_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B85AEDE-7363-42D5-8F3C-1865BB39166C",
"versionEndExcluding": "3.7.23",
"versionStartIncluding": "3.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:splunk_secure_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD62957-0C8B-49FC-BC63-2E0CDC041021",
"versionEndExcluding": "3.8.38",
"versionStartIncluding": "3.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]