CVE Vulnerabilities

CVE-2022-21654

Improper Certificate Validation

Published: Feb 22, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
9.4 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Ubuntu
root.io logo minimus.io logo echo.ai logo

Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoys tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
EnvoyEnvoyproxy1.7.0 (including)1.18.6 (excluding)
EnvoyEnvoyproxy1.19.0 (including)1.19.3 (excluding)
EnvoyEnvoyproxy1.20.0 (including)1.20.2 (excluding)
EnvoyEnvoyproxy1.21.0 (including)1.21.1 (excluding)
OpenShift Service Mesh 2.0RedHatservicemesh-proxy-0:2.0.9-3.el8*
OpenShift Service Mesh 2.1RedHatservicemesh-proxy-0:2.1.2-4.el8*

Potential Mitigations

References