CVE-2020-8028
📋 TL;DR
CVE-2020-8028 is an improper access control vulnerability in SUSE Manager components that allows local users to escalate privileges to root on managed systems. The vulnerability affects SUSE Manager Server, Proxy, and Retail Branch Server versions, enabling attackers to execute code as the salt user and potentially gain full root access on both managed nodes and the managing server itself.
💻 Affected Systems
- SUSE Linux Enterprise Module for SUSE Manager Server
- SUSE Manager Proxy
- SUSE Manager Retail Branch Server
- SUSE Manager Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of all systems managed by SUSE Manager, with root access gained on every managed node and the managing server, leading to full infrastructure takeover.
Likely Case
Local privilege escalation on managed systems, allowing attackers to execute arbitrary commands as root and potentially pivot to other systems in the environment.
If Mitigated
Limited impact if proper network segmentation and access controls prevent local attackers from reaching vulnerable components.
🎯 Exploit Status
Exploitation requires local access to the system but leverages improper access controls in salt configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: SUSE Manager Server 4.1: google-gson 2.8.5-3.4.3, SUSE Manager Proxy 4.0: release-notes-susemanager-proxy 4.0.9-0.16.38.1, SUSE Manager Retail Branch Server 4.0: release-notes-susemanager-proxy 4.0.9-0.16.38.1, SUSE Manager Server 3.2: salt-netapi-client 0.16.0-4.14.1, SUSE Manager Server 4.0: release-notes-susemanager 4.0.9-3.54.1
Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1175884
Restart Required: Yes
Instructions:
1. Update affected packages using SUSE's package manager (zypper). 2. Apply patches for specific components as listed in the advisory. 3. Restart SUSE Manager services after patching. 4. Verify all managed nodes are updated.
🔧 Temporary Workarounds
Restrict local access to salt components
linuxLimit local user access to salt configuration files and directories to prevent exploitation.
chmod 600 /etc/salt/master
chmod 700 /var/cache/salt
chown root:root /etc/salt/master
🧯 If You Can't Patch
- Implement strict access controls to prevent local users from accessing salt configuration files and directories.
- Monitor for suspicious activity by local users attempting to access or modify salt-related files.
🔍 How to Verify
Check if Vulnerable:
Check installed package versions: rpm -qa | grep -E '(google-gson|release-notes-susemanager-proxy|salt-netapi-client|release-notes-susemanager)' and compare with patched versions.
Check Version:
rpm -q google-gson release-notes-susemanager-proxy salt-netapi-client release-notes-susemanager
Verify Fix Applied:
Verify updated package versions match or exceed patched versions listed in the advisory.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to salt configuration files
- Privilege escalation attempts via salt commands
- Unexpected processes running as salt or root user
Network Indicators:
- Unusual salt master-minion communication patterns
- Unexpected network connections from managed nodes
SIEM Query:
source="salt" AND (event="access_denied" OR user="salt" AND action="privilege_escalation")