{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T01:50:00.751","vulnerabilities":[{"cve":{"id":"CVE-2026-20166","sourceIdentifier":"psirt@cisco.com","published":"2026-03-11T17:16:57.130","lastModified":"2026-03-24T19:55:36.203","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In Splunk Enterprise versions below 10.2.1 and 10.0.4, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, and 10.0.2503.12, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could retrieve the Observability Cloud API access token through the Discover Splunk Observability Cloud app due to improper access control. \n\nThis vulnerability does not affect Splunk Enterprise versions below 9.4.9 and 9.3.10 because the Discover Splunk Observability Cloud app does not come with Splunk Enterprise."},{"lang":"es","value":"En las versiones de Splunk Enterprise anteriores a la 10.2.1 y 10.0.4, y en las versiones de Splunk Cloud Platform anteriores a la 10.2.2510.5, 10.1.2507.16 y 10.0.2503.12, un usuario con privilegios bajos que no posee los roles de Splunk 'admin' o 'power' podría recuperar el token de acceso de la API de Observability Cloud a través de la aplicación Discover Splunk Observability Cloud debido a un control de acceso inadecuado.\n\nEsta vulnerabilidad no afecta a las versiones de Splunk Enterprise anteriores a la 9.4.9 y 9.3.10 porque la aplicación Discover Splunk Observability Cloud no viene incluida con Splunk Enterprise."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.0.4","matchCriteriaId":"1E7483F3-FE84-42B9-A2E7-6E89B110BA31"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk:10.2.0:*:*:*:enterprise:*:*:*","matchCriteriaId":"122C01E6-CD7E-44B3-BC65-2ACEDFE704E5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.2503","versionEndExcluding":"10.0.2503.12","matchCriteriaId":"FA248FBD-6AFF-492C-93A8-17EAA7C07FC1"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"10.1.2507","versionEndExcluding":"10.1.2507.16","matchCriteriaId":"17E11C59-CC22-48AA-A969-717D4D527019"},{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.2510","versionEndExcluding":"10.2.2510.5","matchCriteriaId":"6609708F-A13F-4E4E-9883-C11659BD6C3C"}]}]}],"references":[{"url":"https://advisory.splunk.com/advisories/SVD-2026-0305","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}