CVE-2022-22941: Salt Master allows configured users to target any of the minions connected to the syndic with their configured commands in SaltStack Salt
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.
AI Analysis
Technical Summary
CVE-2022-22941 is a high-severity vulnerability affecting SaltStack Salt, a widely used open-source configuration management and remote execution tool. The flaw exists in versions prior to 3002.8, 3003.4, and 3004.1 when Salt is configured in a Master-of-Masters (MoM) setup with a syndic architecture and publisher Access Control Lists (publisher_acl) enabled. In this architecture, a Master-of-Masters manages multiple subordinate Salt Masters (syndics), which in turn manage minions (client nodes). The vulnerability arises because when a user configured in the publisher_acl attempts to target minions connected to the syndic, the Salt Master incorrectly interprets an invalid or empty target specification as valid. This logic error allows these users to bypass intended permission restrictions and execute commands on any minion connected to the syndic, regardless of the configured target constraints. Exploitation requires that the attacker has at least some privileges granted via publisher_acl on the Master-of-Masters, but no user interaction is needed beyond that. The vulnerability impacts confidentiality, integrity, and availability because unauthorized command execution can lead to data exposure, unauthorized changes, or disruption of services on any minion node. The CVSS 3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported to date. The root cause is a CWE-732: Incorrect Permission Assignment for Critical Resource, indicating improper enforcement of access controls in the publisher_acl mechanism within the syndic Master-of-Masters context. This vulnerability is critical for organizations using SaltStack Salt in complex, multi-master environments, especially those relying on fine-grained command targeting and access control to manage large fleets of servers or cloud infrastructure.
Potential Impact
For European organizations, this vulnerability poses significant risks, particularly for enterprises and service providers managing large-scale IT infrastructure with SaltStack Salt in Master-of-Masters configurations. Unauthorized command execution on any minion can lead to widespread compromise, including data breaches, unauthorized configuration changes, and potential service outages. This is especially critical for sectors with stringent data protection requirements such as finance, healthcare, and government, where unauthorized access could violate GDPR and other regulations. The ability to bypass publisher_acl restrictions undermines trust in the access control model, increasing insider threat risks or enabling lateral movement if an attacker gains limited privileges. Given SaltStack's popularity in cloud and hybrid environments, the vulnerability could facilitate attacks on cloud workloads or critical infrastructure components. The lack of known exploits suggests limited active exploitation, but the high severity and ease of exploitation (network accessible, low complexity) mean that threat actors could weaponize this vulnerability rapidly if they gain access to a publisher_acl-configured user account. Therefore, European organizations must prioritize patching and access review to prevent potential compromise and regulatory repercussions.
Mitigation Recommendations
1. Immediate patching: Upgrade SaltStack Salt to versions 3002.8, 3003.4, 3004.1 or later where this vulnerability is fixed. 2. Review and restrict publisher_acl configurations: Limit the number of users with publisher_acl permissions on the Master-of-Masters to only those absolutely necessary, and audit these permissions regularly. 3. Harden Master-of-Masters and syndic communications: Use network segmentation, firewall rules, and strong authentication to restrict access to the Master-of-Masters and syndic masters. 4. Monitor command execution logs: Implement detailed logging and alerting on command executions from publisher_acl users to detect anomalous or unauthorized targeting of minions. 5. Implement multi-factor authentication (MFA) for users with publisher_acl privileges to reduce risk of credential compromise. 6. Conduct regular security assessments and penetration tests focusing on SaltStack configurations, especially in multi-master environments. 7. If immediate patching is not feasible, consider temporarily disabling publisher_acl or the Master-of-Masters setup until a patch can be applied, understanding the operational impact. 8. Educate administrators on the risks of misconfigured access controls in SaltStack and enforce least privilege principles.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-22941: Salt Master allows configured users to target any of the minions connected to the syndic with their configured commands in SaltStack Salt
Description
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.
AI-Powered Analysis
Technical Analysis
CVE-2022-22941 is a high-severity vulnerability affecting SaltStack Salt, a widely used open-source configuration management and remote execution tool. The flaw exists in versions prior to 3002.8, 3003.4, and 3004.1 when Salt is configured in a Master-of-Masters (MoM) setup with a syndic architecture and publisher Access Control Lists (publisher_acl) enabled. In this architecture, a Master-of-Masters manages multiple subordinate Salt Masters (syndics), which in turn manage minions (client nodes). The vulnerability arises because when a user configured in the publisher_acl attempts to target minions connected to the syndic, the Salt Master incorrectly interprets an invalid or empty target specification as valid. This logic error allows these users to bypass intended permission restrictions and execute commands on any minion connected to the syndic, regardless of the configured target constraints. Exploitation requires that the attacker has at least some privileges granted via publisher_acl on the Master-of-Masters, but no user interaction is needed beyond that. The vulnerability impacts confidentiality, integrity, and availability because unauthorized command execution can lead to data exposure, unauthorized changes, or disruption of services on any minion node. The CVSS 3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported to date. The root cause is a CWE-732: Incorrect Permission Assignment for Critical Resource, indicating improper enforcement of access controls in the publisher_acl mechanism within the syndic Master-of-Masters context. This vulnerability is critical for organizations using SaltStack Salt in complex, multi-master environments, especially those relying on fine-grained command targeting and access control to manage large fleets of servers or cloud infrastructure.
Potential Impact
For European organizations, this vulnerability poses significant risks, particularly for enterprises and service providers managing large-scale IT infrastructure with SaltStack Salt in Master-of-Masters configurations. Unauthorized command execution on any minion can lead to widespread compromise, including data breaches, unauthorized configuration changes, and potential service outages. This is especially critical for sectors with stringent data protection requirements such as finance, healthcare, and government, where unauthorized access could violate GDPR and other regulations. The ability to bypass publisher_acl restrictions undermines trust in the access control model, increasing insider threat risks or enabling lateral movement if an attacker gains limited privileges. Given SaltStack's popularity in cloud and hybrid environments, the vulnerability could facilitate attacks on cloud workloads or critical infrastructure components. The lack of known exploits suggests limited active exploitation, but the high severity and ease of exploitation (network accessible, low complexity) mean that threat actors could weaponize this vulnerability rapidly if they gain access to a publisher_acl-configured user account. Therefore, European organizations must prioritize patching and access review to prevent potential compromise and regulatory repercussions.
Mitigation Recommendations
1. Immediate patching: Upgrade SaltStack Salt to versions 3002.8, 3003.4, 3004.1 or later where this vulnerability is fixed. 2. Review and restrict publisher_acl configurations: Limit the number of users with publisher_acl permissions on the Master-of-Masters to only those absolutely necessary, and audit these permissions regularly. 3. Harden Master-of-Masters and syndic communications: Use network segmentation, firewall rules, and strong authentication to restrict access to the Master-of-Masters and syndic masters. 4. Monitor command execution logs: Implement detailed logging and alerting on command executions from publisher_acl users to detect anomalous or unauthorized targeting of minions. 5. Implement multi-factor authentication (MFA) for users with publisher_acl privileges to reduce risk of credential compromise. 6. Conduct regular security assessments and penetration tests focusing on SaltStack configurations, especially in multi-master environments. 7. If immediate patching is not feasible, consider temporarily disabling publisher_acl or the Master-of-Masters setup until a patch can be applied, understanding the operational impact. 8. Educate administrators on the risks of misconfigured access controls in SaltStack and enforce least privilege principles.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- vmware
- Date Reserved
- 2022-01-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbfc3
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/3/2025, 11:13:30 AM
Last updated: 2/7/2026, 3:06:33 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.