CVE-2025-20373
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-26

Last updated on: 2025-11-26

Assigner: Cisco Systems, Inc.

Description
In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add-on exposes client secrets in plain text in the _internal index during the addition of new “Data Security Accounts“. The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) in the Splunk documentation for more information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-26
Last Modified
2025-11-26
Generated
2026-05-07
AI Q&A
2025-11-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
splunk splunk_add-on_for_palo_alto_networks *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

In Splunk Add-on for Palo Alto Networks versions below 2.0.2, client secrets are exposed in plain text within the _internal index when adding new Data Security Accounts. This exposure requires either local access to log files or administrative access to internal indexes, which are typically restricted to admin roles.


How can this vulnerability impact me? :

If an attacker gains local access to log files or administrative access to internal indexes, they could obtain client secrets in plain text. This could lead to unauthorized access or misuse of those secrets, potentially compromising security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by reviewing the _internal index logs in Splunk for exposed client secrets related to the addition of new Data Security Accounts. Since the issue involves client secrets being stored in plain text in the _internal index, you can search the internal logs for sensitive information patterns. Specific commands are not provided in the available information.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include reviewing roles and capabilities on your Splunk instance and restricting access to the _internal index to administrator-level roles only. Ensure that only trusted admin roles have access to internal indexes to prevent exposure of client secrets. Additionally, upgrade the Splunk Add-on for Palo Alto Networks to version 2.0.2 or later where this vulnerability is fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart