CVE-2022-22935: Minion authentication denial of service in SaltStack Salt
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A minion authentication denial of service can cause a MiTM attacker to force a minion process to stop by impersonating a master.
AI Analysis
Technical Summary
CVE-2022-22935 is a vulnerability identified in SaltStack Salt, an open-source configuration management and remote execution tool widely used for automating IT infrastructure. The issue affects versions prior to 3002.8, 3003.4, and 3004.1. The vulnerability allows a man-in-the-middle (MiTM) attacker to impersonate a Salt master and cause a denial of service (DoS) on a Salt minion by disrupting the minion's authentication process. Specifically, the flaw lies in the minion authentication mechanism, where the minion can be tricked into stopping its process upon receiving malicious authentication responses from the attacker posing as the master. This results in the minion becoming unresponsive and unable to execute commands or configurations, effectively halting management operations on the affected system. The vulnerability is classified under CWE-287 (Improper Authentication). The CVSS v3.1 base score is 3.7, indicating a low severity level. The vector indicates that the attack can be performed remotely over the network (AV:N) but requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:L), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though fixed versions are available. This vulnerability primarily affects environments where SaltStack Salt is deployed and where network-level protections against MiTM attacks are insufficient.
Potential Impact
For European organizations, the impact of CVE-2022-22935 is primarily operational disruption. SaltStack Salt is commonly used in enterprise IT environments for configuration management and automation. A successful exploitation could cause Salt minions to stop functioning, leading to loss of automated management capabilities on affected nodes. This could delay critical updates, configuration enforcement, and incident response activities. While the vulnerability does not compromise data confidentiality or integrity, the denial of service on minions could affect availability of IT services, especially in large-scale or critical infrastructure deployments relying heavily on Salt for orchestration. Organizations in sectors such as finance, healthcare, telecommunications, and government, where automation tools are integral to infrastructure management, may experience operational inefficiencies or increased manual workload. However, the requirement for a MiTM position and high attack complexity reduces the likelihood of widespread exploitation. The absence of known exploits in the wild further lowers immediate risk. Nonetheless, organizations with insufficient network segmentation or lacking encrypted communication channels between Salt masters and minions may be more vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade SaltStack Salt to versions 3002.8, 3003.4, 3004.1 or later where the issue is resolved. 2) Ensure that all communications between Salt masters and minions are encrypted and authenticated using strong TLS configurations to prevent MiTM attacks. 3) Implement network segmentation and firewall rules to restrict Salt master-minion communication to trusted network segments only. 4) Monitor network traffic for unusual patterns indicative of MiTM attempts or unexpected Salt master impersonation. 5) Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous authentication attempts or disruptions in Salt communication. 6) Regularly audit SaltStack configurations and logs to identify unexpected minion stoppages or authentication failures. 7) Educate IT staff on the importance of securing SaltStack infrastructure and recognizing potential MiTM attack vectors. These steps go beyond generic advice by focusing on network-level protections, monitoring, and proactive configuration management tailored to SaltStack environments.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland
CVE-2022-22935: Minion authentication denial of service in SaltStack Salt
Description
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A minion authentication denial of service can cause a MiTM attacker to force a minion process to stop by impersonating a master.
AI-Powered Analysis
Technical Analysis
CVE-2022-22935 is a vulnerability identified in SaltStack Salt, an open-source configuration management and remote execution tool widely used for automating IT infrastructure. The issue affects versions prior to 3002.8, 3003.4, and 3004.1. The vulnerability allows a man-in-the-middle (MiTM) attacker to impersonate a Salt master and cause a denial of service (DoS) on a Salt minion by disrupting the minion's authentication process. Specifically, the flaw lies in the minion authentication mechanism, where the minion can be tricked into stopping its process upon receiving malicious authentication responses from the attacker posing as the master. This results in the minion becoming unresponsive and unable to execute commands or configurations, effectively halting management operations on the affected system. The vulnerability is classified under CWE-287 (Improper Authentication). The CVSS v3.1 base score is 3.7, indicating a low severity level. The vector indicates that the attack can be performed remotely over the network (AV:N) but requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:L), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though fixed versions are available. This vulnerability primarily affects environments where SaltStack Salt is deployed and where network-level protections against MiTM attacks are insufficient.
Potential Impact
For European organizations, the impact of CVE-2022-22935 is primarily operational disruption. SaltStack Salt is commonly used in enterprise IT environments for configuration management and automation. A successful exploitation could cause Salt minions to stop functioning, leading to loss of automated management capabilities on affected nodes. This could delay critical updates, configuration enforcement, and incident response activities. While the vulnerability does not compromise data confidentiality or integrity, the denial of service on minions could affect availability of IT services, especially in large-scale or critical infrastructure deployments relying heavily on Salt for orchestration. Organizations in sectors such as finance, healthcare, telecommunications, and government, where automation tools are integral to infrastructure management, may experience operational inefficiencies or increased manual workload. However, the requirement for a MiTM position and high attack complexity reduces the likelihood of widespread exploitation. The absence of known exploits in the wild further lowers immediate risk. Nonetheless, organizations with insufficient network segmentation or lacking encrypted communication channels between Salt masters and minions may be more vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade SaltStack Salt to versions 3002.8, 3003.4, 3004.1 or later where the issue is resolved. 2) Ensure that all communications between Salt masters and minions are encrypted and authenticated using strong TLS configurations to prevent MiTM attacks. 3) Implement network segmentation and firewall rules to restrict Salt master-minion communication to trusted network segments only. 4) Monitor network traffic for unusual patterns indicative of MiTM attempts or unexpected Salt master impersonation. 5) Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous authentication attempts or disruptions in Salt communication. 6) Regularly audit SaltStack configurations and logs to identify unexpected minion stoppages or authentication failures. 7) Educate IT staff on the importance of securing SaltStack infrastructure and recognizing potential MiTM attack vectors. These steps go beyond generic advice by focusing on network-level protections, monitoring, and proactive configuration management tailored to SaltStack environments.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- vmware
- Date Reserved
- 2022-01-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbf93
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:28:15 PM
Last updated: 2/7/2026, 7:29:01 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.