First published: Tue Mar 29 2022(Updated: )
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion’s public key, which can result in attackers substituting arbitrary pillar data.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/salt | >=3003<3003.4 | 3003.4 |
pip/salt | =3004 | 3004.1 |
pip/salt | <3002.8 | 3002.8 |
SaltStack Salt | >=3002<3002.8 | |
SaltStack Salt | >=3003<3003.4 | |
SaltStack Salt | >=3004<3004.1 | |
SaltStack Salt | <3004.1<3003.4<3002.8 | 3004.1 3003.4 3002.8 |
How to Mitigate: Upgrade to 3002.8, 3003.4, or 3004.1 NOTE: When upgrading your Salt infrastructure, first upgrade your Salt master packages before upgrading your Salt minion packages. Upgrading the minion packages first could result in loss of functionality.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22934 is a vulnerability discovered in SaltStack Salt in versions before 3002.8, 3003.4, and 3004.1.
The severity of CVE-2022-22934 is classified as high with a CVSS score of 8.8.
CVE-2022-22934 affects Salt Masters in versions before 3002.8, 3003.4, and 3004.1 by not signing pillar data with the minion's public key, allowing attackers to substitute arbitrary pillar data.
To remediate CVE-2022-22934, upgrade SaltStack Salt to version 3003.4 or later.
For more information about CVE-2022-22934, you can refer to the following sources: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-22934), [Cloudflare Blog](https://blog.cloudflare.com/future-proofing-saltstack/), [SaltStack Salt Releases](https://github.com/saltstack/salt/releases).