CVE-2022-22936
Description
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SaltStack Salt before versions 3002.8, 3003.4, and 3004.1 is vulnerable to replay attacks on job publishes and file server replies, potentially allowing an attacker to gain root access on minions.
Vulnerability
A replay vulnerability exists in SaltStack Salt in versions prior to 3002.8, 3003.4, and 3004.1. Job publishes and file server replies are susceptible to replay attacks, where an attacker can capture and retransmit legitimate requests to trigger unintended actions. The code path is reachable without special configuration, as it affects the default communication between Salt master and minions.
Exploitation
An attacker needs network access to capture Salt traffic between the master and minions. The attacker can replay captured job publishes to cause minions to execute old jobs, or replay file server replies to potentially alter the files received by minions. The attack requires no authentication or user interaction, as the master and minions trust the source of the message based on the message content alone.
Impact
Successful exploitation allows an attacker to force minions to run arbitrary (old) jobs or serve malicious files. Under certain scenarios, a sufficiently craft attacker could escalate this to gain root access on the minion, leading to full compromise of the minion system.
Mitigation
Fixed versions are 3002.8, 3003.4, and 3004.1, released on or around March 29, 2022 [1][2]. Users should upgrade to these or later versions. No workarounds have been publicly disclosed as noted in the advisory database. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
saltPyPI | < 3002.8 | 3002.8 |
saltPyPI | >= 3003, < 3003.4 | 3003.4 |
saltPyPI | >= 3004, < 3004.1 | 3004.1 |
Affected products
35- SaltStack/Saltdescription
- ghsa-coords34 versionspkg:pypi/saltpkg:rpm/opensuse/salt&distro=openSUSE%20Leap%2015.3pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/salt&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/salt&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.0pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Advanced%20Systems%20Management%2012pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Transactional%20Server%2015%20SP3pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP2pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/salt&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/salt&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/salt&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/salt&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/venv-salt-minion&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/venv-salt-minion&distro=SUSE%20Manager%20Client%20Tools%2015
< 3002.8+ 33 more
- (no CPE)range: < 3002.8
- (no CPE)range: < 3002.2-150300.53.16.1
- (no CPE)range: < 4.1.14.1-150200.3.77.1
- (no CPE)range: < 4.2.5.1-150300.3.34.1
- (no CPE)range: < 3002.2-150100.63.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150100.63.1
- (no CPE)range: < 3002.2-150100.63.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150000.8.41.32.1
- (no CPE)range: < 3002.2-150000.8.41.32.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150300.53.16.1
- (no CPE)range: < 3002.2-150300.53.16.1
- (no CPE)range: < 3000-62.1
- (no CPE)range: < 3002.2-150300.53.16.1
- (no CPE)range: < 3002.2-150300.53.16.1
- (no CPE)range: < 3002.2-150300.53.16.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150100.63.1
- (no CPE)range: < 3002.2-150100.63.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150000.8.41.32.1
- (no CPE)range: < 3002.2-150000.8.41.32.1
- (no CPE)range: < 3002.2-150100.63.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3000-62.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3002.2-150200.64.1
- (no CPE)range: < 3004-3.8.1
- (no CPE)range: < 3004-150000.3.8.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- github.com/advisories/GHSA-5r3f-3m3j-wcj2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-22936ghsaADVISORY
- security.gentoo.org/glsa/202310-22ghsavendor-advisoryWEB
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2022-173.yamlghsaWEB
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3002.8.rstghsaWEB
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3003.4.rstghsaWEB
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3004.1.rstghsaWEB
- repo.saltproject.ioghsaWEB
- saltproject.io/security_announcements/salt-security-advisory-releaseghsaWEB
- repo.saltproject.iomitre
- saltproject.io/security_announcements/salt-security-advisory-release/%2Cmitre
News mentions
0No linked articles in our index yet.