Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.
References
Link | Resource |
---|---|
https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 | Patch Third Party Advisory |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283 | Issue Tracking Third Party Advisory |
https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 | Patch Third Party Advisory |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 - Patch, Third Party Advisory | |
References | () https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283 - Issue Tracking, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.4 |
Information
Published : 2022-02-22 23:15
Updated : 2024-11-21 06:45
NVD link : CVE-2022-21654
Mitre link : CVE-2022-21654
CVE.ORG link : CVE-2022-21654
JSON object : View
Products Affected
envoyproxy
- envoy
CWE
CWE-295
Improper Certificate Validation