CVE-2024-38823
BaseFortify
Publication date: 2025-06-13
Last updated on: 2025-06-16
Assigner: VMware
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-294 | A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Salt's request server, which is susceptible to replay attacks when the communication is not protected by TLS encryption. A replay attack means that an attacker can capture valid data transmissions and resend them to trick the server into performing unauthorized actions.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to replay legitimate requests to the Salt request server, potentially causing unauthorized commands or actions to be executed. This could lead to integrity issues, as unauthorized modifications might be made, although confidentiality and availability are not directly impacted.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability, ensure that Salt's request server uses TLS encrypted transport to prevent replay attacks. Avoid using unencrypted communication channels for Salt requests.