CVE-2020-11651

critical-risk
Published 2020-04-30

An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.

Do I need to act?

!
94.4% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
+
Fix available
Upgrade to: 72df4dd40305bde8838567e568e324e3715930d5, d234429aba719e139cac45db0104bf6c53cfd4ea
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

References (23)

Third Party Advisory https://usn.ubuntu.com/4459-1/
and 3 more references
74
/ 100
critical-risk
Severity 32/34 · Critical
Exploitability 27/34 · High
Exposure 15/34 · Moderate