CVE Vulnerabilities

CVE-2022-22936

Authentication Bypass by Capture-replay

Published: Mar 29, 2022 | Modified: May 05, 2025
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
5.4 MEDIUM
AV:A/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios.

Weakness

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Affected Software

NameVendorStart VersionEnd Version
SaltSaltstack3002 (including)3002.8 (excluding)
SaltSaltstack3003 (including)3003.4 (excluding)
SaltSaltstack3004 (including)3004.1 (excluding)
SaltUbuntubionic*
SaltUbuntuimpish*
SaltUbuntukinetic*
SaltUbuntutrusty*
SaltUbuntutrusty/esm*
SaltUbuntuxenial*

Potential Mitigations

References