SaltStack < 3002 Multiple Vulnerabilities

critical Nessus Plugin ID 142489


The version of SaltStack running on the remote server is affected by multiple vulnerabilities.


According to its self-reported version number, the instance of SaltStack hosted on the remote server is affected by multiple vulnerabilities:

- eauth is not sufficiently validated when calling Salt SSH via the salt-api. Any value for 'eauth' or 'token' will allow a user to bypass authentication and make calls to Salt SSH. (CVE-2020-25592)

- When using the functions create_ca, create_csr, and create_self_signed_cert in the tls execution module, the generated keys will not be created with the correct permissions. (CVE-2020-17490)

- A command injection vulnerability exists in Salt API. An unauthenticated, remote attacker can exploit this, via the use of shell injections with the Salt API using the SSH Client, to execute arbitrary commands. (CVE-2020-16846)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version


Upgrade to SaltStack version referenced in the vendor security advisory.

See Also

Plugin Details

Severity: Critical

ID: 142489

File Name: saltstack_3002_multiple_vulnerabilities.nasl

Version: 1.11

Type: local

Agent: unix

Family: Misc.

Published: 11/6/2020

Updated: 12/5/2022

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: High

Score: 8.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2020-25592


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:saltstack:salt

Required KB Items: installed_sw/SaltStack Salt Master

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/3/2020

Vulnerability Publication Date: 11/3/2020

CISA Known Exploited Dates: 5/3/2022

Exploitable With

Metasploit (SaltStack Salt REST API Arbitrary Command Execution)

Reference Information

CVE: CVE-2020-16846, CVE-2020-17490, CVE-2020-25592

IAVA: 2020-A-0195-S

CEA-ID: CEA-2020-0134