CVE-2020-8664

CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cncf:envoy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2020:0734 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2020:0734 - Third Party Advisory
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8 - Third Party Advisory () https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8 - Third Party Advisory
References () https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history - Release Notes, Third Party Advisory () https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history - Release Notes, Third Party Advisory

Information

Published : 2020-03-04 21:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8664

Mitre link : CVE-2020-8664

CVE.ORG link : CVE-2020-8664


JSON object : View

Products Affected

cncf

  • envoy
CWE
CWE-287

Improper Authentication