First published: Fri Nov 06 2020(Updated: )
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <2015.8.10 | |
SaltStack Salt | >=2015.8.11<2015.8.13 | |
SaltStack Salt | >=2016.3.0<2016.3.4 | |
SaltStack Salt | >=2016.3.5<2016.3.6 | |
SaltStack Salt | >=2016.3.7<2016.3.8 | |
SaltStack Salt | >=2016.11.0<2016.11.3 | |
SaltStack Salt | >=2016.11.4<2016.11.6 | |
SaltStack Salt | >=2016.11.7<2016.11.10 | |
SaltStack Salt | >=2017.5.0<2017.7.4 | |
SaltStack Salt | >=2017.7.5<2017.7.8 | |
SaltStack Salt | >=2018.2.0<2018.3.5 | |
SaltStack Salt | >=2019.2.0<2019.2.5 | |
SaltStack Salt | >=3000.0<3000.3 | |
SaltStack Salt | =3001 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
SaltStack Salt | <3002<3001.1, 3001.2<3000.3, 3000.4<2019.2.5, 2019.2.6<2018.3.5<2017.7.4, 2017.7.8<2016.11.3, 2016.11.6, 2016.11.10<2016.3.4, 2016.3.6, 2016.3.8<2015.8.10, 2015.8.13<3002.x<3001.x<3000.x<2019.x | 3002 3001.1, 3001.2 3000.3, 3000.4 2019.2.5, 2019.2.6 2018.3.5 2017.7.4, 2017.7.8 2016.11.3, 2016.11.6, 2016.11.10 2016.3.4, 2016.3.6, 2016.3.8 2015.8.10, 2015.8.13 3002.x 3001.x 3000.x 2019.x |
pip/salt | >=3002.0<3002.1 | 3002.1 |
pip/salt | >=3001.0<3001.3 | 3001.3 |
pip/salt | >=3000.0<3000.5 | 3000.5 |
pip/salt | >=2019.2.0<2019.2.7 | 2019.2.7 |
pip/salt | >=2018.2.0<2018.3.5 | 2018.3.5 |
pip/salt | >=2017.5.0<2017.7.8 | 2017.7.8 |
pip/salt | >=2016.11.0<2016.11.10 | 2016.11.10 |
pip/salt | >=2016.3.0<2016.3.8 | 2016.3.8 |
pip/salt | <2015.8.13 | 2015.8.13 |
debian/salt | ||
ubuntu/salt | <2017.7.4+dfsg1-1ubuntu18.04.2+ | 2017.7.4+dfsg1-1ubuntu18.04.2+ |
ubuntu/salt | <2015.8.8+ | 2015.8.8+ |
Install the patch provided below and restart your Salt-API
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25592 is a vulnerability in SaltStack Salt that allows an attacker to bypass authentication and invoke Salt SSH.
CVE-2020-25592 has a severity rating of 9.8 / 10, which is considered critical.
SaltStack Salt versions 2018.3.4+dfsg1-6+deb10u3, 3002.6+dfsg1-4+deb11u1, and 3004.1+dfsg-2.2 are affected by CVE-2020-25592.
An attacker can exploit CVE-2020-25592 by bypassing authentication and invoking Salt SSH.
Yes, SaltStack has released fixes for CVE-2020-25592. Please refer to the official SaltStack documentation for more information on how to apply the fixes.