Vulnerabilities > Saltstack > High

DATE CVE VULNERABILITY TITLE RISK
2019-12-03 CVE-2013-2228 Improper Restriction of Excessive Authentication Attempts vulnerability in Saltstack 0.14.0/0.14.1/0.15.0
SaltStack RSA Key Generation allows remote users to decrypt communications
network
high complexity
saltstack CWE-307
8.1
2017-10-24 CVE-2017-14696 Improper Input Validation vulnerability in Saltstack Salt
SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request.
network
low complexity
saltstack CWE-20
7.5
2017-09-26 CVE-2017-5200 Unspecified vulnerability in Saltstack Salt
Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.
network
low complexity
saltstack
8.8
2017-09-26 CVE-2017-5192 Improper Authentication vulnerability in Saltstack Salt
When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
network
low complexity
saltstack CWE-287
8.8
2017-08-25 CVE-2015-4017 Improper Certificate Validation vulnerability in Saltstack Salt 2014.7.5
Salt before 2014.7.6 does not verify certificates when connecting via the aliyun, proxmox, and splunk modules.
network
low complexity
saltstack CWE-295
7.5
2017-04-25 CVE-2017-8109 Information Exposure vulnerability in Saltstack Salt
The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
local
low complexity
saltstack CWE-200
7.8
2016-04-12 CVE-2016-1866 Improper Access Control vulnerability in multiple products
Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
network
high complexity
saltstack opensuse CWE-284
8.1