Cyberthreat Advisories | 1898 & Co.

Critical Vulnerabilities Patched in Splunk Products: Immediate Updates Recommended

Written by The 1898 & Co. Team | March 27, 2025

Recent updates from Splunk have addressed multiple vulnerabilities across its product suite, including two high-severity flaws in Splunk Enterprise and the Secure Gateway App. A critical remote code execution (RCE) vulnerability, identified as CVE-2025-20229 with a CVSS score of 8.0, was patched. This flaw, caused by a missing authorization check, could allow low-privileged users to execute arbitrary code by uploading files to a specific directory. The vulnerability has been mitigated in Splunk Enterprise versions 9.4.0, 9.3.3, 9.2.5, and 9.1.8, as well as in corresponding Splunk Cloud Platform versions.

Another significant issue involves an information disclosure vulnerability in both Splunk Enterprise and the Secure Gateway App, where user session and authorization tokens were exposed in clear text within log files. This flaw could be exploited through phishing attacks, potentially compromising user credentials. Patches for this vulnerability are available in Splunk Enterprise versions 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Secure Gateway versions 3.8.38 and 3.7.23.

Splunk has also released fixes for medium-severity vulnerabilities that could lead to unauthorized modifications and data manipulation within Splunk Enterprise. Additionally, low-severity issues in the Splunk App for Lookup Editing and various third-party packages have been addressed. While there are no reports of these vulnerabilities being exploited in the wild, users are strongly advised to update their systems promptly to mitigate potential risks.

Threats and Vulnerabilities

The remote code execution vulnerability (CVE-2025-20229) in Splunk Enterprise poses a significant risk as it allows low-privileged users to execute arbitrary code on affected systems. This could lead to unauthorized access and control over critical infrastructure, potentially impacting thousands of systems globally.

The information disclosure flaw in the Splunk Secure Gateway App exposes sensitive user session data in log files, which could be leveraged in phishing attacks to gain unauthorized access to user accounts. This vulnerability affects industries relying on Splunk for monitoring and security operations, increasing the risk of data breaches.

Medium-severity vulnerabilities in Splunk Enterprise could enable attackers to bypass safeguards and manipulate user data, leading to potential operational disruptions and data integrity issues. These vulnerabilities highlight the importance of maintaining up-to-date security patches to protect against evolving threats.

Client Impact

Clients using Splunk products may face operational disruptions if these vulnerabilities are exploited, leading to potential data breaches and financial losses. The exposure of user session data could result in unauthorized access to sensitive information, damaging client reputation and trust.

Regulatory compliance could be jeopardized if these vulnerabilities lead to data breaches or unauthorized access incidents, potentially resulting in audits or penalties. Clients must assess their current security posture and ensure timely updates to maintain compliance with relevant regulations.

Mitigations

To mitigate the identified risks, clients should take the following actions:

  1. Update all affected Splunk products to the latest versions as specified by Splunk's security advisories.
  2. Regularly review and monitor log files for any unauthorized access attempts or anomalies.
  3. Implement multi-factor authentication (MFA) to enhance account security and reduce the risk of unauthorized access.
  4. Educate employees about phishing attacks and encourage vigilance when handling suspicious emails or requests.
  5. Disable or remove unused apps or features within Splunk products to minimize potential attack vectors.

By implementing these measures, clients can significantly reduce their exposure to these vulnerabilities and enhance their overall security posture. Continuous monitoring and timely updates are crucial components of an effective cybersecurity strategy.

1898 & Co. Response

1898 & Co is actively addressing the current threat landscape by offering tailored security solutions designed to mitigate risks associated with these vulnerabilities. Our team is focused on providing clients with updated security protocols and practices that align with industry standards.

We are collaborating with industry partners and government agencies to enhance our threat intelligence capabilities, ensuring that we remain at the forefront of emerging cybersecurity threats. Our ongoing research efforts are dedicated to identifying potential vulnerabilities and developing effective mitigation strategies.

Clients can benefit from our comprehensive suite of services, including vulnerability assessments, incident response planning, and security awareness training. These services are designed to help organizations strengthen their defenses against evolving cyber threats and maintain compliance with regulatory requirements.

Sources

  1. Splunk Security Advisory: Remote Code Execution in Splunk Enterprise
  2. CVE Details for CVE-2025-20229
  3. Information Disclosure Vulnerability in Splunk Secure Gateway
  4. Phishing Attack Mitigation Strategies