Envoy Proxy TLS Configuration Issue in HashiCorp Consul
CVE-2021-32574
7.5HIGH
Summary
An issue in the Envoy proxy TLS configuration of HashiCorp Consul and Consul Enterprise allows for the potential failure to properly validate the destination service identity within the encoded subject alternative name. This lack of validation may lead to security risks and could affect the communication integrity between services. The vulnerability has been addressed in the following versions: 1.8.14, 1.9.8, and 1.10.1, ensuring improved validation processes.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved