CVE-2020-8660

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some security restrictions in the process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2020:0734 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2020:0734 - Third Party Advisory
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-c4g8-7grc-5wvx - Third Party Advisory () https://github.com/envoyproxy/envoy/security/advisories/GHSA-c4g8-7grc-5wvx - Third Party Advisory
References () https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history - Vendor Advisory () https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history - Vendor Advisory

Information

Published : 2020-03-04 22:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8660

Mitre link : CVE-2020-8660

CVE.ORG link : CVE-2020-8660


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-345

Insufficient Verification of Data Authenticity