The Enterprise Attack Surface Has Grown Exponentially with Boom in Remote Work. Monitor & Protect It. - Learn More

Menu

Ready to Get
Started?

Contact Sales

Critical Saltstack Vulnerability Patching Update - 5 days in

5 days in: Are people actually patching? A Censys Update

Last week, Saltstack announced two critical vulnerabilities, CVE-2020-11651 and CVE-2020-11652. These vulnerabilities allow an attacker to bypass both authentication and authorization controls to effectively take over anything Saltstack is managing; this includes cloud infrastructure, servers, databases, and in some cases even user endpoints like laptops.

The Censys team leapt into action, and on May 1 we found 5,841 exposed and likely vulnerable Salt servers connected to the Internet.  We checked again today, May 6, and found just 3,722 Salt servers exposed - a 36% reduction in just 5 days

Clearly, some folks began to patch as soon as possible after the CVEs were announced, but not enough.

"It's really encouraging to see Salt users taking the recent critical vulnerability seriously, and doing the right thing by either patching to the latest version or at a minimum not making them directly accessible to the internet,” said Mehul Revankar, Director of Product Management at Saltstack. “Scan results from censys.io is a great validation that our communication strategy is working but we still have a long way to go. If you haven't patched already, please patch as soon as possible."

Censys will continue to monitor and report on the number of exposed Salt Servers.


Stay up to date

To get regular news about product updates, user guides, and security tips, send us your email. You can unsubscribe at any time.

Ready to Get Started?

Get a real-time view of all your organization's assets so you can proactively prevent threats.