CVE-2024-38823
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-13

Last updated on: 2025-06-16

Assigner: VMware

Description
Salt's request server is vulnerable to replay attacks when not using a TLS encrypted transport.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-13
Last Modified
2025-06-16
Generated
2026-05-07
AI Q&A
2025-06-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-294 A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Salt's request server, which is susceptible to replay attacks when the communication is not protected by TLS encryption. A replay attack means that an attacker can capture valid data transmissions and resend them to trick the server into performing unauthorized actions.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to replay legitimate requests to the Salt request server, potentially causing unauthorized commands or actions to be executed. This could lead to integrity issues, as unauthorized modifications might be made, although confidentiality and availability are not directly impacted.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the vulnerability, ensure that Salt's request server uses TLS encrypted transport to prevent replay attacks. Avoid using unencrypted communication channels for Salt requests.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart