HomeSaltstackCVE-2017-14695

CVE-2017-14695

CRITICAL
9.8CVSS
Published: 2017-10-24
Updated: 2025-04-20
AI Analysis

Description

Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.

CVSS Metrics

Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-22

Metadata

Primary Vendor
SALTSTACK
Published
10/24/2017
Last Modified
4/20/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

saltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : saltsaltstack : salt

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2017-14695 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com