First published: Fri Mar 04 2022(Updated: )
In spring cloud gateway versions prior to 3.1.1+ , applications that are configured to enable HTTP2 and no key store or trusted certificates are set will be configured to use an insecure TrustManager. This makes the gateway able to connect to remote services with invalid or custom certificates.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Spring Cloud Gateway | =3.1.0 | |
Oracle Commerce Guided Search | =11.3.2 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Console | =22.2.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =22.1.2 | |
Oracle Communications Cloud Native Core Network Repository Function | =22.2.0 | |
Oracle Communications Cloud Native Core Security Edge Protection Proxy | =22.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22946 is a vulnerability in spring cloud gateway versions prior to 3.1.1+ that allows the gateway to connect to remote services with invalid or custom certificates.
CVE-2022-22946 affects applications that are configured to enable HTTP2 without setting a key store or trusted certificates, making them vulnerable to insecure TrustManager.
CVE-2022-22946 affects the following software versions: VMware Spring Cloud Gateway 3.1.0, Oracle Commerce Guided Search 11.3.2, Oracle Communications Cloud Native Core Binding Support Function 22.1.3, Oracle Communications Cloud Native Core Console 22.2.0, Oracle Communications Cloud Native Core Network Repository Function 22.1.2 and 22.2.0, VMware Spring Cloud Gateway 22.1.1.
CVE-2022-22946 has a severity rating of medium, with a severity value of 5.5.
You can find more information about CVE-2022-22946 at the following references: [VMware Security Advisory](https://tanzu.vmware.com/security/cve-2022-22946) and [Oracle Security Alerts](https://www.oracle.com/security-alerts/cpujul2022.html).