Language:
https://bugzilla.suse.com/show_bug.cgi?id=1159670
https://bugzilla.suse.com/show_bug.cgi?id=1175987
https://bugzilla.suse.com/show_bug.cgi?id=1176024
https://bugzilla.suse.com/show_bug.cgi?id=1176294
https://bugzilla.suse.com/show_bug.cgi?id=1176397
https://bugzilla.suse.com/show_bug.cgi?id=1177867
https://bugzilla.suse.com/show_bug.cgi?id=1178319
https://bugzilla.suse.com/show_bug.cgi?id=1178361
https://bugzilla.suse.com/show_bug.cgi?id=1178362
https://bugzilla.suse.com/show_bug.cgi?id=1178485
https://www.suse.com/security/cve/CVE-2020-16846/
https://www.suse.com/security/cve/CVE-2020-17490/
Severity: Critical
ID: 143761
File Name: suse_SU-2020-3244-1.nasl
Version: 1.7
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 12/9/2020
Updated: 4/25/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: High
Score: 8.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-25592
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:salt, p-cpe:/a:novell:suse_linux:python2-salt, p-cpe:/a:novell:suse_linux:salt-minion, p-cpe:/a:novell:suse_linux:salt-proxy, p-cpe:/a:novell:suse_linux:salt-api, p-cpe:/a:novell:suse_linux:python3-salt, p-cpe:/a:novell:suse_linux:salt-ssh, p-cpe:/a:novell:suse_linux:salt-master, p-cpe:/a:novell:suse_linux:salt-standalone-formulas-configuration, p-cpe:/a:novell:suse_linux:salt-doc, p-cpe:/a:novell:suse_linux:salt-cloud, p-cpe:/a:novell:suse_linux:salt-syndic, cpe:/o:novell:suse_linux:15
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/6/2020
Vulnerability Publication Date: 11/6/2020
CISA Known Exploited Vulnerability Due Dates: 5/3/2022
Metasploit (SaltStack Salt REST API Arbitrary Command Execution)