6.5
CVSSv2

CVE-2022-22967

Published: 23/06/2022 Updated: 21/12/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

An issue exists in SaltStack Salt in versions prior to 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

saltstack salt

Vendor Advisories

Debian Bug report logs - #1013872 salt: CVE-2022-22967 Package: src:salt; Maintainer for src:salt is Debian Salt Team <pkg-salt-team@alioth-listsdebiannet>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 26 Jun 2022 11:57:02 UTC Severity: grave Tags: security, upstream Found in version salt/3004 ...