Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities Patched by Splunk and Zoom

Critical Vulnerabilities Patched by Splunk and Zoom

Posted on March 12, 2026 By CWS

Splunk and Zoom Implement Vital Security Updates

This week, Splunk and Zoom have released crucial security updates to address multiple critical and high-severity vulnerabilities within their product lines. These updates are essential for maintaining the security and integrity of their software.

Zoom’s Critical Vulnerability Fixes

Zoom has tackled a critical flaw within its Workplace for Windows application, which posed a risk by allowing unauthenticated, remote attackers to gain elevated privileges over the network. This security issue, affecting the Mail feature, has been resolved in the latest version 6.6.0 for Workplace for Windows and versions 6.4.17, 6.5.15, and 6.6.10 for the Workplace VDI Client.

Besides this, Zoom has also released patches for three high-severity vulnerabilities in specific Windows Zoom Clients. These vulnerabilities could have allowed local attackers to increase their privileges, posing significant security threats.

Splunk’s Comprehensive Update Rollout

On Wednesday, Splunk issued a new series of updates for Splunk Enterprise, addressing numerous vulnerabilities, including five specific to their products. The most serious of these, labeled CVE-2026-20163, has a CVSS score of 8.0. This high-severity flaw could be exploited by attackers with high privileges to execute arbitrary shell commands via a REST endpoint.

The issue was rooted in inadequate input sanitization during the preview of uploaded files before indexing. The patch was implemented in Splunk Enterprise versions 10.2.0, 10.0.4, 9.4.9, and 9.3.10. These updates also fix three medium-severity vulnerabilities that could lead to XSS attacks, credential leaks, and exposure of sensitive data.

Third-Party Dependency Updates and Future Security

In addition to the primary updates, Splunk has also addressed numerous CVEs in third-party packages used by Splunk Enterprise, including several Golang dependencies. A medium-severity vulnerability that risked leaking Observability Cloud API access tokens was resolved in versions 10.2.1 and 10.0.4.

Furthermore, Splunk has fixed multiple critical vulnerabilities in third-party packages within Splunk AppDynamics. Although the company has not reported any active exploitation of these vulnerabilities, users are encouraged to update their systems promptly. Detailed information about these updates is available on Splunk’s security advisories page.

Keeping software up-to-date is crucial in the ongoing battle against cyber threats. As new vulnerabilities emerge, timely updates ensure that systems remain protected against potential exploits.

Security Week News Tags:cyber threats, Cybersecurity, IT security, network security, Patches, security updates, software updates, Splunk, Splunk Enterprise, Vulnerabilities, Windows security, Zoom, Zoom Workplace

Post navigation

Previous Post: MediaTek Chip Flaw Exposes Android PINs in Seconds
Next Post: Microsoft OAuth Device Phishing Threat Escalates

Related Posts

Atlassian Patches Critical Apache Tika Flaw Atlassian Patches Critical Apache Tika Flaw Security Week News
Czech Government Condemns Chinese Hack on Critical Infrastructure Czech Government Condemns Chinese Hack on Critical Infrastructure Security Week News
Kosovar Administrator of Cybercrime Marketplace Extradited to US Kosovar Administrator of Cybercrime Marketplace Extradited to US Security Week News
AI Tools Vulnerable to Comment-Based Prompt Injection AI Tools Vulnerable to Comment-Based Prompt Injection Security Week News
Webinar on Securing Vulnerable OT in a Connected World Webinar on Securing Vulnerable OT in a Connected World Security Week News
DeFi Protocol Balancer Starts Recovering Funds Stolen in 8 Million Heist DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge
  • Chinese Hacker Linked to Cyber Espionage Extradited to U.S.
  • Sevii Introduces Predictable AI Defense Costs
  • Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge
  • Chinese Hacker Linked to Cyber Espionage Extradited to U.S.
  • Sevii Introduces Predictable AI Defense Costs
  • Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark