7.4
CWE
843 295
Advisory Published
Updated

CVE-2022-21656: X.509 subjectAltName matching bypass in Envoy

First published: Tue Feb 22 2022(Updated: )

Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Envoyproxy Envoy<1.20.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-21656?

    CVE-2022-21656 is a vulnerability in the default_validator.cc implementation used by Envoy, which allows a type confusion bug when processing subjectAltNames.

  • What is the severity of CVE-2022-21656?

    CVE-2022-21656 has a severity rating of high, with a CVSSv3 score of 5.9.

  • How does CVE-2022-21656 affect Envoy?

    CVE-2022-21656 affects Envoy versions up to and including 1.20.2.

  • What is the CWE ID for CVE-2022-21656?

    CVE-2022-21656 is associated with CWE-843 and CWE-295.

  • How can I fix CVE-2022-21656 in Envoy?

    To fix CVE-2022-21656 in Envoy, update to a version that includes the fix, such as version 1.21.0 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203