CVE Vulnerabilities

CVE-2022-29222

Improper Certificate Validation

Published: May 21, 2022 | Modified: Jun 08, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesnt posses the private key for and Pion DTLS wouldnt reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients cant be trusted when using a Pion DTLS server prior to version 2.1.5. Users should upgrade to version 2.1.5 to receive a patch. There are currently no known workarounds.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

Name Vendor Start Version End Version
Dtls Pion * 2.1.5 (excluding)
Pion Ubuntu bionic *
Snowflake Ubuntu kinetic *
Snowflake Ubuntu lunar *
Snowflake Ubuntu mantic *
Telegraf Ubuntu impish *
Telegraf Ubuntu kinetic *
Telegraf Ubuntu lunar *
Telegraf Ubuntu mantic *

Potential Mitigations

References