First published: Tue Mar 29 2022(Updated: )
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | >=3002<3002.8 | |
SaltStack Salt | >=3003<3003.4 | |
SaltStack Salt | >=3004<3004.1 | |
SaltStack Salt | <3004.1<3003.4<3002.8 | 3004.1 3003.4 3002.8 |
pip/salt | >=3004<3004.1 | 3004.1 |
pip/salt | >=3003<3003.4 | 3003.4 |
pip/salt | <3002.8 | 3002.8 |
How to Mitigate: Upgrade to 3002.8, 3003.4, or 3004.1 NOTE: When upgrading your Salt infrastructure, first upgrade your Salt master packages before upgrading your Salt minion packages. Upgrading the minion packages first could result in loss of functionality.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22936 is a vulnerability in SaltStack Salt where job publishes and file server replies are susceptible to replay attacks, potentially allowing an attacker to replay job publishes and execute old jobs on minions.
CVE-2022-22936 is considered high severity with a CVSS score of 8.8.
SaltStack Salt versions before 3002.8, 3003.4, and 3004.1 are affected by CVE-2022-22936.
An attacker can exploit CVE-2022-22936 by performing replay attacks on job publishes and file server replies, potentially causing minions to run old jobs.
Yes, upgrading to SaltStack Salt version 3002.8, 3003.4, or 3004.1 addresses the vulnerability.