CVE-2023-20897
Description
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2023-20897 describes a denial-of-service vulnerability in Salt masters prior to 3005.2 or 3006.2 caused by malformed packets depleting worker threads on the request server.
Vulnerability
Description CVE-2023-20897 is a denial-of-service (DoS) vulnerability in Salt masters prior to versions 3005.2 or 3006.2. The root cause is improper handling of errors in decoded messages on the request server. An attacker can send a crafted sequence of malformed packets ("bad packets") to the master's request server, and once the number of such packets equals the number of worker threads, all worker threads become occupied handling these faulty messages. [2][4]
Exploitation
An unauthenticated attacker can exploit this vulnerability over the network by sending a series of specially crafted packets to port 4506 (the minion return port). No special access or credentials are required. Each bad packet consumes a worker thread, and because the errors are not properly handled, the threads are not released. Once the attacker sends a number of packets equal to the configured worker thread count, the master becomes unresponsive to legitimate return requests. [2][4]
Impact
Successful exploitation results in a denial-of-service condition: the Salt master stops processing return requests from minions until it is manually restarted. This renders the master unable to manage infrastructure, disrupting automation and configuration management operations. The CVSS score is 5.3 (Medium) with a vector string AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, reflecting the network-based, low-complexity attack that requires no privileges and causes limited availability impact. [2]
Mitigation
The vulnerability is fixed in Salt versions 3005.2 and 3006.2. Administrators should upgrade affected Salt masters to these patched versions. As an interim mitigation, access to port 4506 from untrusted sources can be firewalled, and security scanning software should be restricted to prevent triggering the vulnerability. [4]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
saltPyPI | < 3005.2 | 3005.2 |
saltPyPI | >= 3006.0rc1, < 3006.2 | 3006.2 |
Affected products
51- Salt/Salt mastersdescription
- ghsa-coords50 versionspkg:pypi/saltpkg:rpm/opensuse/salt&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/salt&distro=openSUSE%20Leap%2015.5pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/release-notes-susemanager-proxy&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/saltbundle-libsodium&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-cffi&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-core&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-cryptography&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-cryptography-vectors&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-cython&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-kiwi&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-lxml&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-pycparser&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-pytz&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-pyxattr&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-pyzmq&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundlepy-rpm-macros&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/saltbundle-zeromq&distro=SUSE:EL-9:Update:Products:SaltBundle:Updatepkg:rpm/suse/salt&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP4pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Transactional%20Server%2015%20SP4pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Transactional%20Server%2015%20SP5pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/salt&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/salt&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/venv-salt-minion&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/venv-salt-minion&distro=SUSE%20Manager%20Client%20Tools%2015pkg:rpm/suse/venv-salt-minion&distro=SUSE%20Manager%20Client%20Tools%20for%20RHEL,%20Liberty%20and%20Clones%209-CLIENT-TOOLSpkg:rpm/suse/venv-salt-minion&distro=SUSE%20Manager%20Client%20Tools%20for%20SLE%20Micro%205pkg:rpm/suse/venv-salt-minion&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/venv-salt-minion&distro=SUSE%20Manager%20Server%20Module%204.3pkg:rpm/suse/venv-salt-minion&distro=SUSE:EL-9:Update:Products:SaltBundle:Update
< 3005.2+ 49 more
- (no CPE)range: < 3005.2
- (no CPE)range: < 3006.0-150400.8.44.1
- (no CPE)range: < 3006.0-150500.4.19.1
- (no CPE)range: < 4.3.8-150400.3.77.1
- (no CPE)range: < 4.3.8-150400.3.61.2
- (no CPE)range: < 1.0.18-1.9.1
- (no CPE)range: < 1.15.1-1.6.1
- (no CPE)range: < 3.10.10-1.9.1
- (no CPE)range: < 3.3.2-1.9.2
- (no CPE)range: < 3.3.2-1.6.1
- (no CPE)range: < 0.29.32-1.6.1
- (no CPE)range: < 3.10.10-1.9.1
- (no CPE)range: < 9.24.43-1.9.1
- (no CPE)range: < 4.9.2-1.9.1
- (no CPE)range: < 2.17-1.6.1
- (no CPE)range: < 2022.1-1.9.1
- (no CPE)range: < 0.7.2-1.6.2
- (no CPE)range: < 24.0.1-1.9.2
- (no CPE)range: < 20211001.fc6c04e-1.6.1
- (no CPE)range: < 4.2.3-1.6.2
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-150100.107.1
- (no CPE)range: < 3006.0-150200.108.1
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-150400.8.44.1
- (no CPE)range: < 3006.0-150400.8.44.1
- (no CPE)range: < 3006.0-150400.8.44.1
- (no CPE)range: < 3006.0-150500.4.19.1
- (no CPE)range: < 3006.0-150400.8.44.1
- (no CPE)range: < 3006.0-150500.4.19.1
- (no CPE)range: < 3006.0-150400.8.44.1
- (no CPE)range: < 3006.0-150500.4.19.1
- (no CPE)range: < 3006.0-150100.107.1
- (no CPE)range: < 3006.0-150200.108.1
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-150100.107.1
- (no CPE)range: < 3006.0-150200.108.1
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-150300.53.60.1
- (no CPE)range: < 3006.0-3.40.1
- (no CPE)range: < 3006.0-150000.3.42.1
- (no CPE)range: < 3006.0-1.24.1
- (no CPE)range: < 3006.0-150000.3.42.1
- (no CPE)range: < 3006.0-150000.3.42.1
- (no CPE)range: < 3006.0-150000.3.42.1
- (no CPE)range: < 3006.0-1.24.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-vpjg-wmf8-29h9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-20897ghsaADVISORY
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2023-166.yamlghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMWJIHQZXHK6FH2E3IWAZCYIRI7FLVOLghsaWEB
- saltproject.io/security-announcements/2023-08-10-advisoryghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMWJIHQZXHK6FH2E3IWAZCYIRI7FLVOL/mitre
- saltproject.io/security-announcements/2023-08-10-advisory/mitre
News mentions
0No linked articles in our index yet.