Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents

Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents

Posted on June 3, 2025June 3, 2025 By CWS

A high-severity vulnerability was uncovered in Splunk Common Forwarder for Home windows that compromises listing entry controls. 

The flaw, designated CVE-2025-20298 with a CVSSv3.1 rating of 8.0, impacts a number of variations of the software program and poses vital safety dangers to enterprise environments counting on Splunk’s knowledge forwarding capabilities.

The vulnerability stems from incorrect permission task throughout the set up or improve of Common Forwarder for Home windows. 

Permission Task Vulnerability

This safety flaw is classed below CWE-732 (Incorrect Permission Task for Crucial Useful resource), indicating a basic difficulty with entry management mechanisms.

The vulnerability manifests when Common Forwarder for Home windows variations beneath 9.4.2, 9.3.4, 9.2.6, and 9.1.9 are newly put in or upgraded to an affected model. 

Throughout these processes, the set up listing—usually positioned at C:Program FilesSplunkUniversalForwarder—receives incorrect permissions that permit non-administrator customers to entry the listing and all its contents. 

This represents a big breach of the precept of least privilege, a cornerstone of enterprise safety frameworks.

The CVSSv3.1 vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H signifies that whereas the assault requires low-level privileges and person interplay, it can lead to excessive influence throughout confidentiality, integrity, and availability. 

The community assault vector part suggests potential for distant exploitation below sure circumstances.

The scope of this vulnerability is appreciable, affecting 4 main launch branches of Splunk Common Forwarder for Home windows. 

Particularly, the vulnerability impacts variations within the 9.4 department beneath 9.4.2, the 9.3 department beneath 9.3.4, the 9.2 department beneath 9.2.6, and the 9.1 department beneath 9.1.9. 

This broad model protection signifies that quite a few enterprise deployments could also be susceptible.

The safety implications are notably regarding for organizations that use the Splunk Common Forwarder to gather and ahead delicate log knowledge from Home windows methods. 

Non-administrator customers gaining unauthorized entry to the set up listing may doubtlessly view configuration information, entry forwarded knowledge, and even modify forwarding habits. 

This might result in knowledge exfiltration, tampering with audit trails, or disruption of vital monitoring and compliance features.

Threat FactorsDetailsAffected ProductsSplunk Common Forwarder for Home windows variations:- 9.4 department (< 9.4.2)- 9.3 department (< 9.3.4)- 9.2 department (< 9.2.6)- 9.1 department (< 9.1.9)ImpactUnauthorized entry to Splunk set up listing and contents, modification of configuration/log information, threat of service disruption Exploit Stipulations– Native entry to Home windows system with affected Splunk version- Non-administrator person account- Set up/improve to susceptible model with out mitigationCVSS 3.1 Score8.0 (Excessive)

Mitigation Methods

Splunk recommends an instantaneous improve to mounted variations: 9.4.2, 9.3.4, 9.2.6, 9.1.9, or larger. 

Organizations ought to prioritize these updates given the excessive severity score and potential for privilege escalation.

For environments the place rapid upgrading just isn’t possible, Splunk gives a particular mitigation command that should be executed as a Home windows system administrator. 

The workaround entails working the next icacls.exe command from both a command immediate or a PowerShell window:

This icacls command removes the problematic permissions by concentrating on the Constructed-in Customers group (represented by *BU) from the set up listing. 

The /take away:g parameter removes particular group permissions, whereas the /C flag continues the operation regardless of any errors encountered.

Organizations should apply this mitigation in three particular situations: new installations of affected variations, upgrades to affected variations, and conditions involving uninstallation and reinstallation of present affected Splunk installations. 

System directors ought to implement this repair instantly after any of those operations to stop unauthorized entry.

Velocity up and enrich menace investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Access, Contents, Forwarder, Lets, NonAdmin, Splunk, Universal, Users, Windows

Post navigation

Previous Post: MainStreet Bank Data Breach Impacts Customer Payment Cards 
Next Post: Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code

Related Posts

AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine’s AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine’s Cyber Security News
Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes Cyber Security News
Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Cyber Security News
Retail Finance Giant SitusAMC Data Breach Exposes Accounting Records and Legal Agreements Retail Finance Giant SitusAMC Data Breach Exposes Accounting Records and Legal Agreements Cyber Security News
Qihoo 360’s SSL Key Leak: Major Security Breach Qihoo 360’s SSL Key Leak: Major Security Breach Cyber Security News
Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark