
[CIVN-2026-0202] Multiple Vulnerabilities in Splunk Enterprise Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Splunk Enterprise Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Splunk Enterprise (Splunk Web) prior to version 10.2.1
Splunk Enterprise (REST API) prior to version 10.2.2
Splunk Enterprise (Splunk Web & REST API) prior to version 10.0.5
Splunk Enterprise (Splunk Web & REST API) prior to version 9.4.10
Splunk Enterprise (Splunk Web & REST API) prior to version 9.3.11
Splunk Cloud Platform (Splunk Web) prior to version 10.3.2512.5
Splunk Cloud Platform (REST API) prior to version 10.3.2512.6
Splunk Cloud Platform (Splunk Web) prior to version 10.2.2510.9
Splunk Cloud Platform (REST API) prior to version 10.2.2510.10
Splunk Cloud Platform (Splunk Web) prior to version 10.1.2507.19
Splunk Cloud Platform (REST API) prior to version 10.1.2507.20
Splunk Cloud Platform (Splunk Web & REST API) prior to version 10.0.2503.13
Splunk Cloud Platform (Splunk Web & REST API) prior to version 9.3.2411.127
Splunk MCP Server prior to version 1.0.3
Overview
Multiple vulnerabilities have been reported in Splunk products which could be exploited by an attacker to execute arbitrary code, gain access to sensitive information, or perform unauthorized actions on the targeted system.
Target Audience:
Organizations and individuals using Splunk Enterprise, Splunk Cloud Platform, and Splunk MCP Server.
Risk Assessment:
Potential for complete system compromise.
Impact Assessment:
High risk of information disclosure, privilege misuse, and full system compromise.
Description
Splunk is a data analytics platform that collects, indexes, and analyzes machine-generated data to enable real-time monitoring, security insights, and operational intelligence.
Multiple vulnerabilities have been reported in Splunk products due to improper access control, improper input validation, insecure handling of temporary files, and exposure of sensitive information in logs. An attacker could exploit these vulnerabilities by sending specially crafted requests to the targeted system.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, gain access to sensitive information, or perform unauthorized actions on the targeted system.
Solution
Apply appropriate fixes issued by the vendor:
https://advisory.splunk.com/advisories/SVD-2026-0401
https://advisory.splunk.com/advisories/SVD-2026-0402
https://advisory.splunk.com/advisories/SVD-2026-0403
https://advisory.splunk.com/advisories/SVD-2026-0407
Vendor Information
Splunk
https://advisory.splunk.com/
References
Splunk
https://advisory.splunk.com/advisories/SVD-2026-0401
https://advisory.splunk.com/advisories/SVD-2026-0402
https://advisory.splunk.com/advisories/SVD-2026-0403
https://advisory.splunk.com/advisories/SVD-2026-0407
CVE Name
CVE-2026-20202
CVE-2026-20203
CVE-2026-20204
CVE-2026-20205
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=rtdY
—–END PGP SIGNATURE—–


