CVE-2022-22967
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/06/2022
Last modified:
05/05/2025
Description
An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 3002.9 (excluding) | |
| cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 3003 (including) | 3003.5 (excluding) |
| cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 3004 (including) | 3004.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://repo.saltproject.io/
- https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/%2C
- https://security.gentoo.org/glsa/202310-22
- https://repo.saltproject.io/
- https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/%2C
- https://security.gentoo.org/glsa/202310-22



