Skip to main content

CVE-2022-22935: Minion authentication denial of service in SaltStack Salt

Low
VulnerabilityCVE-2022-22935cvecve-2022-22935
Published: Tue Mar 29 2022 (03/29/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: SaltStack Salt

Description

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A minion authentication denial of service can cause a MiTM attacker to force a minion process to stop by impersonating a master.

AI-Powered Analysis

AILast updated: 07/06/2025, 23:28:15 UTC

Technical Analysis

CVE-2022-22935 is a vulnerability identified in SaltStack Salt, an open-source configuration management and remote execution tool widely used for automating IT infrastructure. The issue affects versions prior to 3002.8, 3003.4, and 3004.1. The vulnerability allows a man-in-the-middle (MiTM) attacker to impersonate a Salt master and cause a denial of service (DoS) on a Salt minion by disrupting the minion's authentication process. Specifically, the flaw lies in the minion authentication mechanism, where the minion can be tricked into stopping its process upon receiving malicious authentication responses from the attacker posing as the master. This results in the minion becoming unresponsive and unable to execute commands or configurations, effectively halting management operations on the affected system. The vulnerability is classified under CWE-287 (Improper Authentication). The CVSS v3.1 base score is 3.7, indicating a low severity level. The vector indicates that the attack can be performed remotely over the network (AV:N) but requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:L), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though fixed versions are available. This vulnerability primarily affects environments where SaltStack Salt is deployed and where network-level protections against MiTM attacks are insufficient.

Potential Impact

For European organizations, the impact of CVE-2022-22935 is primarily operational disruption. SaltStack Salt is commonly used in enterprise IT environments for configuration management and automation. A successful exploitation could cause Salt minions to stop functioning, leading to loss of automated management capabilities on affected nodes. This could delay critical updates, configuration enforcement, and incident response activities. While the vulnerability does not compromise data confidentiality or integrity, the denial of service on minions could affect availability of IT services, especially in large-scale or critical infrastructure deployments relying heavily on Salt for orchestration. Organizations in sectors such as finance, healthcare, telecommunications, and government, where automation tools are integral to infrastructure management, may experience operational inefficiencies or increased manual workload. However, the requirement for a MiTM position and high attack complexity reduces the likelihood of widespread exploitation. The absence of known exploits in the wild further lowers immediate risk. Nonetheless, organizations with insufficient network segmentation or lacking encrypted communication channels between Salt masters and minions may be more vulnerable.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Upgrade SaltStack Salt to versions 3002.8, 3003.4, 3004.1 or later where the issue is resolved. 2) Ensure that all communications between Salt masters and minions are encrypted and authenticated using strong TLS configurations to prevent MiTM attacks. 3) Implement network segmentation and firewall rules to restrict Salt master-minion communication to trusted network segments only. 4) Monitor network traffic for unusual patterns indicative of MiTM attempts or unexpected Salt master impersonation. 5) Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous authentication attempts or disruptions in Salt communication. 6) Regularly audit SaltStack configurations and logs to identify unexpected minion stoppages or authentication failures. 7) Educate IT staff on the importance of securing SaltStack infrastructure and recognizing potential MiTM attack vectors. These steps go beyond generic advice by focusing on network-level protections, monitoring, and proactive configuration management tailored to SaltStack environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2022-01-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbf93

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 11:28:15 PM

Last updated: 7/26/2025, 6:11:54 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats