CVE-2022-29222

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to version 2.1.5. Users should upgrade to version 2.1.5 to receive a patch. There are currently no known workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pion:dtls:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:58

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 5.9
References () https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412 - Patch, Third Party Advisory () https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412 - Patch, Third Party Advisory
References () https://github.com/pion/dtls/releases/tag/v2.1.5 - Release Notes, Third Party Advisory () https://github.com/pion/dtls/releases/tag/v2.1.5 - Release Notes, Third Party Advisory
References () https://github.com/pion/dtls/security/advisories/GHSA-w45j-f832-hxvh - Third Party Advisory () https://github.com/pion/dtls/security/advisories/GHSA-w45j-f832-hxvh - Third Party Advisory

Information

Published : 2022-05-21 00:15

Updated : 2024-11-21 06:58


NVD link : CVE-2022-29222

Mitre link : CVE-2022-29222

CVE.ORG link : CVE-2022-29222


JSON object : View

Products Affected

pion

  • dtls
CWE
CWE-295

Improper Certificate Validation