First published: Tue Feb 05 2019(Updated: )
The kube-rbac-proxy container before version 0.4.1 as used in Red Hat OpenShift Container Platform does not honor TLS configurations, allowing for use of insecure ciphers and TLS 1.0. An attacker could target traffic sent over a TLS connection with a weak configuration and potentially break the encryption.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kube-rbac-proxy | <0.4.1 | |
redhat openshift container platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3818 is classified as a moderate severity vulnerability due to its potential impact on TLS security.
To fix CVE-2019-3818, upgrade the kube-rbac-proxy to version 0.4.1 or later to ensure TLS configurations are correctly honored.
CVE-2019-3818 affects kube-rbac-proxy versions prior to 0.4.1 and Red Hat OpenShift Container Platform version 3.11.
CVE-2019-3818 allows the use of insecure ciphers and TLS 1.0, which can lead to potential compromise of encrypted traffic.
CVE-2019-3818 can be exploited through a remote attack vector if an attacker targets the weak TLS configuration.