Incorrect configuration handling allows TLS session re-use without re-validation in Envoy
CVE-2022-21654

7.4HIGH

Key Information:

Vendor

Envoyproxy

Status
Vendor
CVE Published:
22 February 2022

What is CVE-2022-21654?

Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

envoy >= 1.7.0, < 1.18.6 < 1.7.0, 1.18.6

envoy >= 1.19.0, < 1.19.3 < 1.19.0, 1.19.3

envoy >= 1.20.0, < 1.20.2 < 1.20.0, 1.20.2

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.