| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| salt | pip | = 0.17.0 | 0.17.1 |
The vulnerability stems from missing SSH host key validation in salt-ssh. The primary suspect is the SSH connection handling logic. In SaltStack's architecture, salt.client.ssh.SSH is the core component for SSH operations. The handle_ssh function would be responsible for establishing connections, and if it uses Paramiko's AutoAddPolicy or omits StrictHostKeyChecking, it enables MITM attacks. The Shell.exec_cmd function is included with medium confidence because it relies on the insecure SSH client configuration. The high confidence for handle_ssh aligns with typical SSH client initialization patterns in SaltStack and the vulnerability's root cause description.
KEV Misses 88% of Exploited CVEs- Get the report