First published: Thu Dec 08 2022(Updated: )
Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Traefik Traefik | <2.9.6 | |
<2.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46153 is a potential vulnerability in Traefik managing TLS connections, where a router configured with a not well-formatted TLSOption is exposed with an empty TLSOption.
Traefik is an open source HTTP reverse proxy and load balancer.
CVE-2022-46153 affects Traefik versions up to and excluding 2.9.6.
The severity of CVE-2022-46153 is high with a severity score of 6.5.
To fix CVE-2022-46153, the recommended action is to upgrade to Traefik version 2.9.6 or later.