← Volver a CVEs
CVE-2026-20202
MEDIUM6.6
Descripcion
In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.20, 10.0.2503.13, and 9.3.2411.127, a user who holds a role that contains the high-privilege capability `edit_user`could create a specially crafted username that includes a null byte or a non-UTF-8 percent-encoded byte due to improper input validation.<br><br>This could lead to inconsistent conversion of usernames into a proper format for storage and account management inconsistencies, such as being unable to edit or delete affected users.
Detalles CVE
Puntuacion CVSS v3.16.6
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadHIGH
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado4/15/2026
Ultima modificacion4/17/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
splunk:splunksplunk:splunk_cloud_platform
Debilidades (CWE)
CWE-176
Referencias
https://advisory.splunk.com/advisories/SVD-2026-0401(psirt@cisco.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.