CVE-2020-8028

9.3 CRITICAL

📋 TL;DR

CVE-2020-8028 is an improper access control vulnerability in SUSE Manager components that allows local users to escalate privileges to root on managed systems. The vulnerability affects SUSE Manager Server, Proxy, and Retail Branch Server versions, enabling attackers to execute code as the salt user and potentially gain full root access on both managed nodes and the managing server itself.

💻 Affected Systems

Products:
  • SUSE Linux Enterprise Module for SUSE Manager Server
  • SUSE Manager Proxy
  • SUSE Manager Retail Branch Server
  • SUSE Manager Server
Versions: SUSE Manager Server 4.1 (google-gson prior to 2.8.5-3.4.3), SUSE Manager Proxy 4.0 (release-notes-susemanager-proxy prior to 4.0.9-0.16.38.1), SUSE Manager Retail Branch Server 4.0 (release-notes-susemanager-proxy prior to 4.0.9-0.16.38.1), SUSE Manager Server 3.2 (salt-netapi-client prior to 0.16.0-4.14.1), SUSE Manager Server 4.0 (release-notes-susemanager prior to 4.0.9-3.54.1)
Operating Systems: SUSE Linux Enterprise
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems managed by SUSE Manager where local users have access to the salt configuration or related components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all systems managed by SUSE Manager, with root access gained on every managed node and the managing server, leading to full infrastructure takeover.

🟠

Likely Case

Local privilege escalation on managed systems, allowing attackers to execute arbitrary commands as root and potentially pivot to other systems in the environment.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent local attackers from reaching vulnerable components.

🌐 Internet-Facing: LOW - This vulnerability requires local access to exploit, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Local attackers within the network can exploit this to gain root privileges across managed systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system but leverages improper access controls in salt configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SUSE Manager Server 4.1: google-gson 2.8.5-3.4.3, SUSE Manager Proxy 4.0: release-notes-susemanager-proxy 4.0.9-0.16.38.1, SUSE Manager Retail Branch Server 4.0: release-notes-susemanager-proxy 4.0.9-0.16.38.1, SUSE Manager Server 3.2: salt-netapi-client 0.16.0-4.14.1, SUSE Manager Server 4.0: release-notes-susemanager 4.0.9-3.54.1

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1175884

Restart Required: Yes

Instructions:

1. Update affected packages using SUSE's package manager (zypper). 2. Apply patches for specific components as listed in the advisory. 3. Restart SUSE Manager services after patching. 4. Verify all managed nodes are updated.

🔧 Temporary Workarounds

Restrict local access to salt components

linux

Limit local user access to salt configuration files and directories to prevent exploitation.

chmod 600 /etc/salt/master
chmod 700 /var/cache/salt
chown root:root /etc/salt/master

🧯 If You Can't Patch

  • Implement strict access controls to prevent local users from accessing salt configuration files and directories.
  • Monitor for suspicious activity by local users attempting to access or modify salt-related files.

🔍 How to Verify

Check if Vulnerable:

Check installed package versions: rpm -qa | grep -E '(google-gson|release-notes-susemanager-proxy|salt-netapi-client|release-notes-susemanager)' and compare with patched versions.

Check Version:

rpm -q google-gson release-notes-susemanager-proxy salt-netapi-client release-notes-susemanager

Verify Fix Applied:

Verify updated package versions match or exceed patched versions listed in the advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to salt configuration files
  • Privilege escalation attempts via salt commands
  • Unexpected processes running as salt or root user

Network Indicators:

  • Unusual salt master-minion communication patterns
  • Unexpected network connections from managed nodes

SIEM Query:

source="salt" AND (event="access_denied" OR user="salt" AND action="privilege_escalation")

🔗 References

📤 Share & Export