CVE-2022-21654

Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:45

Type Values Removed Values Added
References () https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 - Patch, Third Party Advisory () https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 - Patch, Third Party Advisory
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283 - Issue Tracking, Third Party Advisory () https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283 - Issue Tracking, Third Party Advisory
CVSS v2 : 6.8
v3 : 9.8
v2 : 6.8
v3 : 7.4

Information

Published : 2022-02-22 23:15

Updated : 2024-11-21 06:45


NVD link : CVE-2022-21654

Mitre link : CVE-2022-21654

CVE.ORG link : CVE-2022-21654


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-295

Improper Certificate Validation