
We found results for “”
CVE-2021-25281
Good to know:


Date: February 26, 2021
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master. After conducting further research, Mend has determined that versions v0.6.0--v3000.6, v3001rc1--v3001.4 and v3002rc1--v3002.2 of Salt are vulnerable to CVE-2021-25281.
Language: Python
Severity Score
Related Resources (26)
Severity Score
Weakness Type (CWE)
Improper Authentication
CWE-287Top Fix

Upgrade Version
Upgrade to version salt - 3002.3;salt - 3001.5;salt - 2015.8.13;salt - 2016.11.5;salt - 2016.11.10;salt - 2017.7.8;salt - 2019.2.8;salt - 3000.7
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | PARTIAL |
Availability (A): | PARTIAL |
Additional information: |