Splunk and Zoom Implement Vital Security Updates
This week, Splunk and Zoom have released crucial security updates to address multiple critical and high-severity vulnerabilities within their product lines. These updates are essential for maintaining the security and integrity of their software.
Zoom’s Critical Vulnerability Fixes
Zoom has tackled a critical flaw within its Workplace for Windows application, which posed a risk by allowing unauthenticated, remote attackers to gain elevated privileges over the network. This security issue, affecting the Mail feature, has been resolved in the latest version 6.6.0 for Workplace for Windows and versions 6.4.17, 6.5.15, and 6.6.10 for the Workplace VDI Client.
Besides this, Zoom has also released patches for three high-severity vulnerabilities in specific Windows Zoom Clients. These vulnerabilities could have allowed local attackers to increase their privileges, posing significant security threats.
Splunk’s Comprehensive Update Rollout
On Wednesday, Splunk issued a new series of updates for Splunk Enterprise, addressing numerous vulnerabilities, including five specific to their products. The most serious of these, labeled CVE-2026-20163, has a CVSS score of 8.0. This high-severity flaw could be exploited by attackers with high privileges to execute arbitrary shell commands via a REST endpoint.
The issue was rooted in inadequate input sanitization during the preview of uploaded files before indexing. The patch was implemented in Splunk Enterprise versions 10.2.0, 10.0.4, 9.4.9, and 9.3.10. These updates also fix three medium-severity vulnerabilities that could lead to XSS attacks, credential leaks, and exposure of sensitive data.
Third-Party Dependency Updates and Future Security
In addition to the primary updates, Splunk has also addressed numerous CVEs in third-party packages used by Splunk Enterprise, including several Golang dependencies. A medium-severity vulnerability that risked leaking Observability Cloud API access tokens was resolved in versions 10.2.1 and 10.0.4.
Furthermore, Splunk has fixed multiple critical vulnerabilities in third-party packages within Splunk AppDynamics. Although the company has not reported any active exploitation of these vulnerabilities, users are encouraged to update their systems promptly. Detailed information about these updates is available on Splunk’s security advisories page.
Keeping software up-to-date is crucial in the ongoing battle against cyber threats. As new vulnerabilities emerge, timely updates ensure that systems remain protected against potential exploits.
