CVE Vulnerabilities

CVE-2020-8660

Insufficient Verification of Data Authenticity

Published: Mar 04, 2020 | Modified: Jul 13, 2020
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some security restrictions in the process.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

Name Vendor Start Version End Version
Envoy Envoyproxy * 1.12.3 (excluding)
Envoy Envoyproxy 1.13.0 (including) 1.13.1 (excluding)
OpenShift Service Mesh 1.0 RedHat servicemesh-proxy-0:1.0.9-2.el8 *

References