CVE-2026-20144

6.8 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users with access to Splunk's _internal index to view SAML configuration data in plain text within log files. This affects Splunk Enterprise and Splunk Cloud Platform deployments with Search Head Clusters where SAML authentication is configured. The exposure could reveal sensitive authentication configuration details.

💻 Affected Systems

Products:
  • Splunk Enterprise
  • Splunk Cloud Platform
Versions: Splunk Enterprise: below 10.2.0, 10.0.2, 9.4.7, 9.3.8, 9.2.11; Splunk Cloud Platform: below 10.2.2510.0, 10.1.2507.11, 10.0.2503.9, 9.3.2411.120
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments with Search Head Clusters (SHC) where SAML authentication is configured for Attribute Query Requests or Authentication extensions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain SAML configuration secrets, potentially enabling them to impersonate legitimate users, bypass authentication, or gain unauthorized access to federated systems.

🟠

Likely Case

Insider threats or compromised accounts could exfiltrate SAML configuration data, leading to credential harvesting or authentication bypass in connected systems.

🟢

If Mitigated

With proper access controls and monitoring, the risk is limited to authorized users who already have significant privileges within the Splunk environment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Splunk with role permissions to access the _internal index and view conf.log files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Splunk Enterprise: 10.2.0, 10.0.2, 9.4.7, 9.3.8, 9.2.11; Splunk Cloud Platform: 10.2.2510.0, 10.1.2507.11, 10.0.2503.9, 9.3.2411.120

Vendor Advisory: https://advisory.splunk.com/advisories/SVD-2026-0209

Restart Required: Yes

Instructions:

1. Backup your Splunk configuration. 2. Download and install the appropriate patched version from Splunk's official distribution channels. 3. Restart Splunk services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict _internal index access

all

Limit access to the _internal index to only essential administrative users

splunk edit user <username> -roles <role_without_internal_access>
splunk edit role <rolename> -srchIndexesAllowed <indexes> -srchIndexesDefault <indexes>

Disable SAML logging to conf.log

all

Modify logging configuration to prevent SAML data from being written to conf.log

Edit $SPLUNK_HOME/etc/log.cfg or app-specific logging configurations

🧯 If You Can't Patch

  • Implement strict access controls to limit _internal index access to essential administrative personnel only
  • Enable enhanced monitoring and alerting for access to _internal index and conf.log files

🔍 How to Verify

Check if Vulnerable:

Check Splunk version and verify if SAML authentication is configured in a Search Head Cluster deployment

Check Version:

splunk version

Verify Fix Applied:

Verify the installed version meets or exceeds the patched versions listed in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to _internal index
  • Unusual queries against conf.log files
  • Large data exports from _internal index

Network Indicators:

  • Unusual outbound traffic from Splunk servers containing configuration data

SIEM Query:

index=_internal source=*conf.log* | search *SAML* OR *AttributeQuery* OR *AuthExtension* | stats count by user, src_ip

🔗 References

📤 Share & Export