CVE-2021-3144

EUVD-2021-0231
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
Affected Products (NVD)
VendorProductVersion
saltstacksalt
𝑥
< 2015.8.10
saltstacksalt
2015.8.11 ≤
𝑥
< 2015.8.13
saltstacksalt
2016.3.0 ≤
𝑥
< 2016.3.4
saltstacksalt
2016.3.5 ≤
𝑥
< 2016.3.6
saltstacksalt
2016.3.7 ≤
𝑥
< 2016.3.8
saltstacksalt
2016.3.9 ≤
𝑥
< 2016.11.3
saltstacksalt
2016.11.4 ≤
𝑥
< 2016.11.5
saltstacksalt
2016.11.7 ≤
𝑥
< 2016.11.10
saltstacksalt
2017.5.0 ≤
𝑥
< 2017.7.8
saltstacksalt
2018.2.0 ≤
𝑥
≤ 2018.3.5
saltstacksalt
2019.2.0 ≤
𝑥
< 2019.2.5
saltstacksalt
2019.2.6 ≤
𝑥
< 2019.2.8
saltstacksalt
3000 ≤
𝑥
< 3000.6
saltstacksalt
3001 ≤
𝑥
< 3001.4
saltstacksalt
3002 ≤
𝑥
< 3002.5
debiandebian_linux
9.0
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
salt
bionic
needs-triage
focal
dne
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
dne
mantic
dne
noble
dne
trusty
needs-triage
xenial
needs-triage