Sensitive Information Disclosure in Splunk Secure Gateway App
Advisory ID: SVD-2025-0302
CVE ID: CVE-2025-20231
Published: 2025-03-26
Last Update: 2025-03-26
CVSSv3.1 Score: 7.1, High
CVSSv3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE: CWE-532
Bug ID: VULN-21909
Description
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and versions below 3.8.38 and 3.7.23 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a search using the permissions of a higher-privileged user that could lead to disclosure of sensitive information.
The Splunk Secure Gateway exposes user session and authorization tokens in clear text in the splunk_secure_gateway.log file when it calls the /services/ssg/secrets
REST endpoint.
The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated low-privileged user should not be able to exploit the vulnerability at will.
Solution
Upgrade Splunk Enterprise to versions 9.4.1, 9.3.3, 9.2.5, and 9.1.8 or higher.
Splunk is actively monitoring and patching Splunk Cloud Platform instances.
Product Status
Product | Version | Component | Affected Version | Fix Version |
---|---|---|---|---|
Splunk Enterprise | 9.4 | Splunk Secure Gateway | 9.4.0 | 9.4.1 |
Splunk Enterprise | 9.3 | Splunk Secure Gateway | 9.3.0 to 9.3.2 | 9.3.3 |
Splunk Enterprise | 9.2 | Splunk Secure Gateway | 9.2.0 to 9.2.4 | 9.2.5 |
Splunk Enterprise | 9.1 | Splunk Secure Gateway | 9.1.0 to 9.1.7 | 9.1.8 |
Splunk Secure Gateway | 3.8 | Below 3.8.38 | 3.8.38 | |
Splunk Secure Gateway | 3.7 | Below 3.7.23 | 3.7.23 |
Mitigations and Workarounds
Disable the Splunk Secure Gateway App. See Manage app and add-on objects.
Note: Splunk Mobile, Spacebridge, and Mission Control rely on functionality in the Splunk Secure Gateway app. If you do not use any of the apps, features, or functionality, as a potential mitigation, you may remove or disable the app.
Detections
None
Severity
Splunk rates this vulnerability a 7.1, High, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H.
If you remove or disable the Splunk Secure Gateway app, there should be no impact and the severity would be informational.
If you do not use and have never registered a device on the Splunk Secure Gateway app, there should be no impact and the severity would be informational.
Acknowledgments
Anton (therceman)