CVE-2026-20138

6.8 MEDIUM

📋 TL;DR

This vulnerability allows users with access to Splunk's _internal index to view sensitive authentication secrets in plain text. Specifically, Duo Two-Factor Authentication integration keys, secret keys, and app secret keys are exposed. This affects Splunk Enterprise Search Head Cluster deployments with Duo integration enabled.

💻 Affected Systems

Products:
  • Splunk Enterprise
Versions: Below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using Duo Two-Factor Authentication for Splunk Enterprise in Search Head Cluster configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with access to the _internal index could steal Duo authentication secrets, potentially bypassing two-factor authentication and gaining unauthorized access to Splunk systems or connected services.

🟠

Likely Case

Internal users with legitimate access to the _internal index could inadvertently or intentionally view and misuse sensitive authentication secrets, compromising the security of Duo integration.

🟢

If Mitigated

With proper access controls limiting _internal index access to only essential administrators, the exposure risk is significantly reduced.

🌐 Internet-Facing: LOW - This requires authenticated access to Splunk's internal systems and specific index permissions.
🏢 Internal Only: MEDIUM - Internal users with appropriate role permissions could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires only authenticated access and appropriate role permissions.

Exploitation requires a user account with access to the _internal index, which is typically restricted to administrators or specific roles.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.0, 10.0.2, 9.4.7, 9.3.9, or 9.2.11

Vendor Advisory: https://advisory.splunk.com/advisories/SVD-2026-0203

Restart Required: Yes

Instructions:

1. Identify your current Splunk Enterprise version. 2. Upgrade to the appropriate patched version based on your current release track. 3. Restart Splunk services after upgrade. 4. Verify the fix by checking that Duo secrets are no longer visible in plain text in the _internal index.

🔧 Temporary Workarounds

Restrict _internal index access

all

Limit access to the _internal index to only essential administrative users who absolutely require it.

splunk edit user <username> -roles <role_without_internal_access>
splunk edit role <rolename> -srchIndexesDefault <indexes> -srchIndexesAllowed <indexes>

Disable Duo integration temporarily

all

If Duo two-factor authentication is not critical, temporarily disable it until patching can be completed.

Edit authentication.conf to disable Duo settings

🧯 If You Can't Patch

  • Immediately restrict access to the _internal index to the smallest possible set of users
  • Implement additional monitoring and auditing for access to the _internal index

🔍 How to Verify

Check if Vulnerable:

Check if Duo authentication secrets are visible in plain text by searching the _internal index for patterns matching integrationKey, secretKey, or appSecretKey values.

Check Version:

splunk version

Verify Fix Applied:

After patching, verify that searching the _internal index no longer returns plain text Duo authentication secrets.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to the _internal index
  • Search queries targeting Duo-related fields in _internal index

Network Indicators:

  • N/A - This is a data exposure issue, not network exploitable

SIEM Query:

index=_internal (integrationKey OR secretKey OR appSecretKey) | stats count by user, src

🔗 References

📤 Share & Export