Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
Advisories

No advisories yet.

Fixes

Solution

Upgrade Salt to a release that includes the Junos module YAML loader fix (e.g., Salt 3006.17 or later for the 3006 LTS line). For distro-packaged builds, install the vendor-provided fixed package version (for example Alpine salt-lts 3006.17-r0 or higher).


Workaround

If upgrading immediately is not possible, reduce exposure by restricting which users/automation can invoke junos execution module functions and by limiting access to any YAML inputs used by the junos module. Prefer trusted sources only for YAML content.

History

Fri, 30 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
Title Salt junos module uses an unsafe YAML loader which may allow unintended code execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-01-30T19:30:20.366Z

Reserved: 2025-10-10T10:06:33.841Z

Link: CVE-2025-62348

cve-icon Vulnrichment

Updated: 2026-01-30T19:30:17.029Z

cve-icon NVD

Status : Received

Published: 2026-01-30T19:16:10.860

Modified: 2026-01-30T19:16:10.860

Link: CVE-2025-62348

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses