In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add-on exposes client secrets in plain text in the _internal index during the addition of new “Data Security Accounts“. The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) in the Splunk documentation for more information.
History

Wed, 26 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
Description In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add-on exposes client secrets in plain text in the _internal index during the addition of new “Data Security Accounts“. The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) in the Splunk documentation for more information.
Title Sensitive Information Disclosure in “_internal“ index through Splunk Add-On for Palo Alto Networks
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2025-11-26T17:59:06.210Z

Updated: 2025-11-26T18:28:46.500Z

Reserved: 2024-10-10T19:15:13.262Z

Link: CVE-2025-20373

cve-icon Vulnrichment

Updated: 2025-11-26T18:28:40.258Z

cve-icon NVD

Status : Received

Published: 2025-11-26T18:15:48.137

Modified: 2025-11-26T18:15:48.137

Link: CVE-2025-20373

cve-icon Redhat

No data.