First published: Tue Feb 22 2022(Updated: )
Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoyproxy Envoy | <1.20.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21656 is a vulnerability in the default_validator.cc implementation used by Envoy, which allows a type confusion bug when processing subjectAltNames.
CVE-2022-21656 has a severity rating of high, with a CVSSv3 score of 5.9.
CVE-2022-21656 affects Envoy versions up to and including 1.20.2.
CVE-2022-21656 is associated with CWE-843 and CWE-295.
To fix CVE-2022-21656 in Envoy, update to a version that includes the fix, such as version 1.21.0 or later.