Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues.
History

Fri, 30 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues.
Title Salt Master authentication protocol downgrade may enable minion impersonation
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L'}

cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-01-30T19:30:53.376Z

Reserved: 2025-10-10T10:06:33.841Z

Link: CVE-2025-62349

cve-icon Vulnrichment

Updated: 2026-01-30T19:30:46.828Z

cve-icon NVD

Status : Received

Published: 2026-01-30T19:16:11.770

Modified: 2026-01-30T19:16:11.770

Link: CVE-2025-62349

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.