{"api_version":"1","generated_at":"2026-04-23T01:31:41+00:00","cve":"CVE-2020-8664","urls":{"html":"https://cve.report/CVE-2020-8664","api":"https://cve.report/api/cve/CVE-2020-8664.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-8664","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-8664"},"summary":{"title":"CVE-2020-8664","description":"CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-03-04 21:15:00","updated_at":"2021-07-21 11:39:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8","name":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8","refsource":"MISC","tags":["Third Party Advisory"],"title":"Incorrect Access Control when using SDS with Combined Validation Context · Advisory · envoyproxy/envoy · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history","name":"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history","refsource":"CONFIRM","tags":["Release Notes","Third Party Advisory"],"title":"Version history — envoy tag-v1.13.1 documentation","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2020:0734","name":"RHSA-2020:0734","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-8664","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8664","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"8664","vulnerable":"1","versionEndIncluding":"1.13.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cncf","cpe5":"envoy","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-8664","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"CONFIRM","name":"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history","url":"https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history"},{"refsource":"MISC","name":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8","url":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-3x9m-pgmg-xpx8"},{"refsource":"REDHAT","name":"RHSA-2020:0734","url":"https://access.redhat.com/errata/RHSA-2020:0734"}]}},"nvd":{"publishedDate":"2020-03-04 21:15:00","lastModifiedDate":"2021-07-21 11:39:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cncf:envoy:*:*:*:*:*:*:*:*","versionEndIncluding":"1.13.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"8664","Ordinal":"169005","Title":"CVE-2020-8664","CVE":"CVE-2020-8664","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"8664","Ordinal":"1","NoteData":"CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"8664","Ordinal":"2","NoteData":"2020-03-04","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"8664","Ordinal":"3","NoteData":"2020-03-11","Type":"Other","Title":"Modified"}]}}}