Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade Salt to a release that includes the Junos module YAML loader fix (e.g., Salt 3006.17 or later for the 3006 LTS line). For distro-packaged builds, install the vendor-provided fixed package version (for example Alpine salt-lts 3006.17-r0 or higher).
Workaround
If upgrading immediately is not possible, reduce exposure by restricting which users/automation can invoke junos execution module functions and by limiting access to any YAML inputs used by the junos module. Prefer trusted sources only for YAML content.
Fri, 30 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process. | |
| Title | Salt junos module uses an unsafe YAML loader which may allow unintended code execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-01-30T19:30:20.366Z
Reserved: 2025-10-10T10:06:33.841Z
Link: CVE-2025-62348
Updated: 2026-01-30T19:30:17.029Z
Status : Received
Published: 2026-01-30T19:16:10.860
Modified: 2026-01-30T19:16:10.860
Link: CVE-2025-62348
No data.
OpenCVE Enrichment
No data.