CVE-2025-62349: Salt Authentication Protocol Version Downgrade Allows Minion Impersonation
(updated )
Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues.
References
- docs.saltproject.io/en/latest/topics/releases/3006.17.html
- docs.saltproject.io/en/latest/topics/releases/3007.9.html
- github.com/advisories/GHSA-vcf3-26xf-fw4m
- github.com/saltstack/salt
- github.com/saltstack/salt/commit/3d5708acae16d039a1e2b5529c8e14a0d3255611
- github.com/saltstack/salt/issues/68467
- nvd.nist.gov/vuln/detail/CVE-2025-62349
Code Behaviors & Features
Detect and mitigate CVE-2025-62349 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →