
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. The vulnerability, identified as CVE-2022-22934, involves Salt Masters not signing pillar data with the minion's public key, which can result in attackers substituting arbitrary pillar data. The vulnerability was reported on November 5, 2021, and was patched on March 28, 2022 (Cloudflare Blog).
The vulnerability stems from a flaw in the protocol variation used for pillar messages. A monster-in-the-middle (MitM) attacker positioned between a server and client could substitute arbitrary pillar data to the client. The attack was possible because neither the newly generated key nor the actual payload were authenticated as coming from the server. The attacker only needs to know the client's public key, which is easily obtainable since clients broadcast it during key exchange requests (Cloudflare Blog).
The vulnerability's impact is significant as pillar data can include sensitive information such as packages to be installed, credentials, and cryptographic keys. An attacker exploiting this vulnerability could potentially gain access to the vulnerable client machine by manipulating this data (Cloudflare Blog).
The vulnerability was patched in Salt versions 3002.8, 3003.4, and 3004.1. The fix adds a server signature to the pillar message to prevent the attack. Users are strongly advised to update to these patched versions or newer releases (Cloudflare Blog, Gentoo Security).
The vulnerability was discovered by Cloudflare researchers while examining SaltStack's cryptographic protocol for quantum computing preparedness. The discovery led to a broader discussion about improving Salt's security architecture, including potential migration to mutually authenticated TLS (mTLS) for enhanced security (Cloudflare Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."