First published: Fri Feb 03 2023(Updated: )
Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is enabled AND unproxied ports are turned off, then an attacker could connect to an application that should be only reachable via mTLS, without presenting a client certificate.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Cf-deployment | >=17.1<=23.2.0 | |
Cloudfoundry Diego | >=2.55.0<=2.69.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31733 is a vulnerability that allows application ingress without a client certificate if mTLS route integrity is enabled and unproxied ports are turned off in Cloudfoundry CF Deployment 17.1 to 23.2.0 and Cloudfoundry Diego 2.55.0 to 2.69.0.
CVE-2022-31733 allows unauthorized access to apps via another port on diego cells, bypassing client certificate requirement, if mTLS route integrity is enabled and unproxied ports are turned off.
CVE-2022-31733 allows unauthorized access to apps via another port on diego cells, bypassing client certificate requirement, if mTLS route integrity is enabled and unproxied ports are turned off.
The severity of CVE-2022-31733 is critical with a CVSS score of 9.1.
To fix CVE-2022-31733, update Cloudfoundry CF Deployment to a version beyond 23.2.0 or Cloudfoundry Diego to a version beyond 2.69.0.