Sensitive Information Disclosure in Splunk Secure Gateway App

Advisory ID: SVD-2025-0302

CVE ID: CVE-2025-20231

Published: 2025-03-26

Last Update: 2025-03-26

CVSSv3.1 Score: 7.1, High

CWE: CWE-532

Bug ID: VULN-21909

Description

In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.

The Splunk Secure Gateway exposes user session and authorization tokens in clear text in the splunk_secure_gateway.log file when it calls the /services/ssg/secrets REST endpoint.

The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.

Solution

Upgrade Splunk Enterprise to versions 9.4.1, 9.3.3, 9.2.5, and 9.1.8 or higher.

Splunk is actively monitoring and patching Splunk Cloud Platform instances.

Product Status

ProductVersionComponentAffected VersionFix Version
Splunk Enterprise9.4Splunk Secure Gateway9.4.09.4.1
Splunk Enterprise9.3Splunk Secure Gateway9.3.0 to 9.3.29.3.3
Splunk Enterprise9.2Splunk Secure Gateway9.2.0 to 9.2.49.2.5
Splunk Enterprise9.1Splunk Secure Gateway9.1.0 to 9.1.79.1.8
Splunk Secure Gateway3.8Below 3.8.383.8.38
Splunk Secure Gateway3.7Below 3.7.233.7.23

Mitigations and Workarounds

Disable the Splunk Secure Gateway App. See Manage app and add-on objects.

Note: Splunk Mobile, Spacebridge, and Mission Control rely on functionality in the Splunk Secure Gateway app. If you do not use any of the apps, features, or functionality, as a potential mitigation, you may remove or disable the app.

Detections

None

Severity

Splunk rates this vulnerability a 7.1, High, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H.

If you remove or disable the Splunk Secure Gateway app, there should be no impact and the severity would be informational.

If you do not use and have never registered a device on the Splunk Secure Gateway app, there should be no impact and the severity would be informational.

Acknowledgments

Anton (therceman)