CVE-2022-21654
Summary
| CVE | CVE-2022-21654 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-22 23:15:00 UTC |
| Updated | 2022-03-03 18:11:00 UTC |
| Description | Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade. |
Risk And Classification
Problem Types: CWE-295
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Envoyproxy | Envoy | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Incorrect configuration handling allows mTLS session re-use without re-validation after validation settings have changed · Advisory · envoyproxy/envoy · GitHub | CONFIRM | github.com | |
| CVE-2022-21654 · envoyproxy/envoy@e9f936d · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.