Vulnerability Description
In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability `change_authentication` could enumerate internal IP addresses and network ports when adding new search peers to a Splunk search head in a distributed environment.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Splunk | Splunk | >= 9.2.0, < 9.2.10 |
| Splunk | Splunk Cloud Platform | >= 9.3.2411, < 9.3.2411.116 |
Related Weaknesses (CWE)
References
- https://advisory.splunk.com/advisories/SVD-2025-1207Vendor Advisory
FAQ
What is CVE-2025-20388?
CVE-2025-20388 is a vulnerability with a CVSS score of 2.7 (LOW). In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the hig...
How severe is CVE-2025-20388?
CVE-2025-20388 has been rated LOW with a CVSS base score of 2.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-20388?
Check the references section above for vendor advisories and patch information. Affected products include: Splunk Splunk, Splunk Splunk Cloud Platform.