Cyber security news for all


    Vulnerabilities in SaltStack Salt management allow attackers authorization controls

    The vulnerabilities allow attackers to bypass the authentication and authorization controls that govern access to the Salt implementations. An attacker could use these vulnerabilities to remotely execute code with root privileges on the master and ultimately on all minions connected to the master. Salt is open source software from SaltStack that is used in infrastructure and security automation solutions. It is a popular tool used to maintain data centers and cloud environments.

    Vulnerabilities Affect Salt Versions Which Basically Cover All Saltstack Implementations

    However, experienced attackers can also perform more effective attacks. For example, they can install back doors through which they can explore the network and then proceed to the theft of confidential data or a variety of other attacks that are specific to their goals.

    The security vulnerabilities affect Salt versions and older ones, which basically cover all Salt implementations that were in use before the SaltStack update released today. While attackers will find it more difficult to reach hosts hidden from the internet, they can still take advantage of the masters by accessing corporate networks in other ways.

    Saltstack Has Published Additional Instructions On How To Secure Salt Implementations

    The F-Secure researchers say that organizations should take advantage of Salt’s new update features to ensure future patches, as they become available. Companies with vulnerable should also use additional controls to restrict access to the salt master ports in standard configurations. On this basis, system administration can be treated like developer code, because the corresponding configuration files themselves can be maintained by classic version managers, which have already proven themselves in software development. In the next step, the configuration management software takes care that the previously defined state is executed on the server.

    Recent Articles

    TikTok has fixed a serious security gap issue

    TikTok accounts paid a researcher a reward of 4000 dollars after he reported two vulnerabilities as part of a disclosure. A combination of both...

    Passwords should be changed for Fortinet VPNs

    Administrators should change the access for Fortinet VPNs in use. Log-in information for almost 50,000 VPN networks has appeared in various cyber blogs. A security...

    Twitter confirmed to bring back account verification

    Twitter is bringing back verifications for the account verification in the beginning of 2021. Certain users will then be given a control mark again,...

    350,000 Spotify users were hacked

    At the beginning of July this year, security researchers discovered an unsecured database that contained access and other information from 350,000 Spotify users. Spotify...

    Europol sees artificial intelligence as a dangerous cyber threat

    Cyber criminals can use intelligence to carry out attacks more easily and thus cause more damage. Europol is warning of this in a joint...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox