First published: Tue Jul 12 2022(Updated: )
All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Argo-cd | >=0.5.0<=2.1.12 | |
Linuxfoundation Argo-cd | >=2.2.0<=2.2.7 | |
Linuxfoundation Argo-cd | >=2.3.0<=2.3.1 | |
Argoproj Argo Cd | >=0.5.0<=2.1.12 | |
Argoproj Argo Cd | >=2.2.0<=2.2.7 | |
Argoproj Argo Cd | >=2.3.0<=2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Argo CD vulnerability is CVE-2022-1025.
The severity of CVE-2022-1025 is critical with a severity value of 8.8.
CVE-2022-1025 affects all unpatched versions of Argo CD starting with v1.0.0.
CVE-2022-1025 allows a malicious user to potentially escalate their privileges to admin-level.
To fix CVE-2022-1025, it is recommended to apply the latest patch provided by Argo CD.