Company Details
splunk
9,558
764,900
5112
splunk.com
0
SPL_2582792
In-progress

Splunk Company CyberSecurity Posture
splunk.comSplunk is helping to build a safer and more resilient digital world by equipping customers with the unified security and observability platform they need to keep their organization securely up and running — no matter what digital disruptions come their way.
Company Details
splunk
9,558
764,900
5112
splunk.com
0
SPL_2582792
In-progress
Between 750 and 799

Splunk Global Score (TPRM)XXXX

Description: Splunk has suffered a security incident due to two separate high-severity vulnerabilities. The first vulnerability enables RCE, allowing low-privileged users to execute arbitrary code through malicious file uploads, affecting Splunk Enterprise and Splunk Cloud Platform before certain versions. The second vulnerability affects the Splunk Secure Gateway app, where users can search with higher-privileged permissions, leading to potential unauthorized disclosure of sensitive information. Both issues have been patched, with suggested updates provided to Splunk users to remediate the risk. The security flaws highlight the critical importance of maintaining updated systems and monitoring access control within corporate environments to prevent data breaches and maintain operational integrity.


Splunk has 75.44% more incidents than the average of same-industry companies with at least one recorded incident.
Splunk has 28.21% more incidents than the average of all companies with at least one recorded incident.
Splunk reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Splunk cyber incidents detection timeline including parent company and subsidiaries

Splunk is helping to build a safer and more resilient digital world by equipping customers with the unified security and observability platform they need to keep their organization securely up and running — no matter what digital disruptions come their way.


On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s

We're championing possibilities for all by making money fast, easy, and more enjoyable. Our hope is unlock opportunities for people in their everyday lives and empower the millions of people and businesses around the world who trust, rely, and use PayPal every day. For support, visit the PayPal He

**Snowflake is proud to be the Official Data Collaboration Provider for LA28 and Team USA.** Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite

Cadence is a market leader in AI and digital twins, pioneering the application of computational software to accelerate innovation in the engineering design of silicon to systems. Our design solutions, based on Cadence’s Intelligent System Design™ strategy, are essential for the world’s leading semic

ServiceNow (NYSE: NOW) makes the world work better for everyone. Our cloud-based platform and solutions help digitize and unify organizations so that they can find smarter, faster, better ways to make work flow. So employees and customers can be more connected, more innovative, and more agile. And w
SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and
Baidu is a leading AI company with strong Internet foundation, driven by our mission to “make the complicated world simpler through technology”. Founded in 2000 as a search engine platform, we were an early adopter of artificial intelligence in 2010. Since then, we have established a full AI stack,
Autodesk is changing how the world is designed and made. Our technology spans architecture, engineering, construction, product design, manufacturing, and media and entertainment. We empower innovators everywhere to solve challenges, big and small. From greener buildings to smarter products and mo

JD.com, also known as JINGDONG, is a leading e-commerce company transferring to be a technology and service enterprise with supply chain at its core. JD.com’s business has expanded across retail, technology, logistics, health, property development, industrials, and international business. Ranking 44
.png)
From CISA to Cisco, Splunk and the ExIm Bank, cybersecurity experts reveal how agencies can secure infrastructure, unify data and build...
Exposed Permissions: The Splunk Flaw That Could Upend Enterprise Defenses. In the fast-paced world of cybersecurity, where threats evolve as...
Splunk for Windows has a high-severity flaw that lets local users escalate privileges through misconfigured file permissions.
Discover Splunk Enterprise vulnerabilities CVE-2025-20386 and CVE-2025-20387. Learn how to secure your system and prevent local security...
A high-severity vulnerability has been disclosed in Splunk affecting its Enterprise and Universal Forwarder products for Windows,...
PRNewswire/ -- Cisco today announced Splunk's continued position as a leader in the rapidly evolving security information and event...
NotDoor Malware - The Splunk Threat Research Team has shed light on a new malware strain, NotDoor, which leverages Microsoft Outlook.
Cisco posted robust operating results for its most recent fiscal quarter, bolstered by strong growth in networking sales and continued heat...
Only 4% of organisations are fully cyber ready, according to the 2025 Cisco Cybersecurity Readiness Index, highlighting persistent gaps in...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Splunk is http://www.splunk.com.
According to Rankiteo, Splunk’s AI-generated cybersecurity score is 787, reflecting their Fair security posture.
According to Rankiteo, Splunk currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Splunk is not certified under SOC 2 Type 1.
According to Rankiteo, Splunk does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Splunk is not listed as GDPR compliant.
According to Rankiteo, Splunk does not currently maintain PCI DSS compliance.
According to Rankiteo, Splunk is not compliant with HIPAA regulations.
According to Rankiteo,Splunk is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Splunk operates primarily in the Software Development industry.
Splunk employs approximately 9,558 people worldwide.
Splunk presently has no subsidiaries across any sectors.
Splunk’s official LinkedIn profile has approximately 764,900 followers.
Splunk is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Splunk does not have a profile on Crunchbase.
Yes, Splunk maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/splunk.
As of December 18, 2025, Rankiteo reports that Splunk has experienced 1 cybersecurity incidents.
Splunk has an estimated 27,810 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with patches provided to users, remediation measures with suggested updates to remediate risk..
Title: Splunk Security Incident
Description: Splunk has suffered a security incident due to two separate high-severity vulnerabilities. The first vulnerability enables RCE, allowing low-privileged users to execute arbitrary code through malicious file uploads, affecting Splunk Enterprise and Splunk Cloud Platform before certain versions. The second vulnerability affects the Splunk Secure Gateway app, where users can search with higher-privileged permissions, leading to potential unauthorized disclosure of sensitive information. Both issues have been patched, with suggested updates provided to Splunk users to remediate the risk. The security flaws highlight the critical importance of maintaining updated systems and monitoring access control within corporate environments to prevent data breaches and maintain operational integrity.
Type: Security Vulnerabilities
Attack Vector: Malicious File UploadsPrivilege Escalation
Vulnerability Exploited: Remote Code Execution (RCE)Unauthorized Disclosure of Sensitive Information
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Systems Affected: Splunk EnterpriseSplunk Cloud PlatformSplunk Secure Gateway app

Entity Name: Splunk
Entity Type: Corporation
Industry: Software

Remediation Measures: Patches provided to usersSuggested updates to remediate risk
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patches provided to users, Suggested updates to remediate risk, .

Lessons Learned: The critical importance of maintaining updated systems and monitoring access control within corporate environments to prevent data breaches and maintain operational integrity.
Key Lessons Learned: The key lessons learned from past incidents are The critical importance of maintaining updated systems and monitoring access control within corporate environments to prevent data breaches and maintain operational integrity.

Root Causes: Remote Code Execution (Rce) Through Malicious File Uploads, Unauthorized Disclosure Of Sensitive Information Through Privilege Escalation,
Corrective Actions: Patches And Updates Provided To Users,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patches And Updates Provided To Users, .
Most Significant System Affected: The most significant system affected in an incident was Splunk EnterpriseSplunk Cloud PlatformSplunk Secure Gateway app.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The critical importance of maintaining updated systems and monitoring access control within corporate environments to prevent data breaches and maintain operational integrity.
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.