In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add-on exposes client secrets in plain text in the _internal index during the addition of new “Data Security Accounts“. The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) in the Splunk documentation for more information.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2025-1105 |
|
History
Wed, 26 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add-on exposes client secrets in plain text in the _internal index during the addition of new “Data Security Accounts“. The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) in the Splunk documentation for more information. | |
| Title | Sensitive Information Disclosure in “_internal“ index through Splunk Add-On for Palo Alto Networks | |
| Weaknesses | CWE-532 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published: 2025-11-26T17:59:06.210Z
Updated: 2025-11-26T18:28:46.500Z
Reserved: 2024-10-10T19:15:13.262Z
Link: CVE-2025-20373
Updated: 2025-11-26T18:28:40.258Z
Status : Received
Published: 2025-11-26T18:15:48.137
Modified: 2025-11-26T18:15:48.137
Link: CVE-2025-20373
No data.