In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability `change_authentication` could enumerate internal IP addresses and network ports when adding new search peers to a Splunk search head in a distributed environment.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://advisory.splunk.com/advisories/SVD-2025-1207 |
|
History
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Splunk
Splunk splunk Cloud Platform Splunk splunk Enterprise |
|
| Vendors & Products |
Splunk
Splunk splunk Cloud Platform Splunk splunk Enterprise |
Wed, 03 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability `change_authentication` could enumerate internal IP addresses and network ports when adding new search peers to a Splunk search head in a distributed environment. | |
| Title | Blind Server Side Request Forgery (SSRF) through Distributed Search Peers in Splunk Enterprise | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published: 2025-12-03T17:00:59.450Z
Updated: 2025-12-03T18:14:46.236Z
Reserved: 2024-10-10T19:15:13.265Z
Link: CVE-2025-20388
Updated: 2025-12-03T18:12:37.752Z
Status : Awaiting Analysis
Published: 2025-12-03T17:15:51.427
Modified: 2025-12-04T17:15:08.283
Link: CVE-2025-20388
No data.