{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20164","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2025-10-08T11:59:15.389Z","datePublished":"2026-03-11T16:18:01.915Z","dateUpdated":"2026-03-12T16:19:36.648Z"},"containers":{"cna":{"affected":[{"product":"Splunk Enterprise","vendor":"Splunk","versions":[{"version":"10.0","status":"affected","versionType":"custom","lessThan":"10.0.3"},{"version":"9.4","status":"affected","versionType":"custom","lessThan":"9.4.9"},{"version":"9.3","status":"affected","versionType":"custom","lessThan":"9.3.10"}]},{"product":"Splunk Cloud Platform","vendor":"Splunk","versions":[{"version":"10.2.2510","status":"affected","versionType":"custom","lessThan":"10.2.2510.5"},{"version":"10.1.2507","status":"affected","versionType":"custom","lessThan":"10.1.2507.16"},{"version":"10.0.2503","status":"affected","versionType":"custom","lessThan":"10.0.2503.11"},{"version":"9.3.2411","status":"affected","versionType":"custom","lessThan":"9.3.2411.123"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file due to improper access control. This vulnerability could allow for the unauthorized disclosure of sensitive credentials."}],"value":"In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file due to improper access control. This vulnerability could allow for the unauthorized disclosure of sensitive credentials."}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2026-0303"}],"title":"Sensitive Information Disclosure through Improper Access Control in Splunk Enterprise","datePublic":"2026-03-11T00:00:00.000Z","metrics":[{"cvssV3_1":{"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1","baseScore":6.5,"baseSeverity":"MEDIUM"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"cwe","description":"The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.","cweId":"CWE-200"}]}],"source":{"advisory":"SVD-2026-0303"},"credits":[{"lang":"en","value":"Alex Hordijk (hordalex)"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2026-03-11T16:18:01.915Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-12T15:40:30.867807Z","id":"CVE-2026-20164","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-12T16:19:36.648Z"}}]}}