We found results for “”
CVE-2025-62349
Good to know:
Date: January 30, 2026
Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues.
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Authentication
CWE-287Top Fix
Upgrade Version
Upgrade to version salt - 3006.17;salt - 3007.9;https://github.com/saltstack/salt.git - v3006.17;https://github.com/saltstack/salt.git - v3007.9
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


