First published: Tue Sep 05 2023(Updated: )
DOS in minion return.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <3005.2 | |
SaltStack Salt | >=3006.0<3006.2 | |
pip/salt | >=3006.0rc1<3006.2 | 3006.2 |
pip/salt | <3005.2 | 3005.2 |
SaltStack Salt | <3005.2<3006.2 | 3005.2 3006.2 |
How to Mitigate:Upgrade Salt masters to 3005.2 or 3006.2Alternatively, firewall port 4506 from access from untrusted sources and security scanning software.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20897 is a vulnerability in Salt masters prior to 3005.2 or 3006.2 that allows denial-of-service attacks through minion return.
CVE-2023-20897 makes Salt masters unresponsive to return requests until restarted after receiving several bad packets on the request server.
The severity of CVE-2023-20897 is medium, with a CVSS score of 5.3.
To fix CVE-2023-20897, upgrade your Salt master to version 3005.2 or 3006.2.
You can find more information about CVE-2023-20897 [here](https://nvd.nist.gov/vuln/detail/CVE-2023-20897), [here](https://saltproject.io/security-announcements/2023-08-10-advisory/), and [here](https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2023-166.yaml).