CVE-2022-21656

Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.
Configurations

Configuration 1 (hide)

cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

24 Jul 2023, 13:50

Type Values Removed Values Added
CWE CWE-295 CWE-843

02 Mar 2022, 14:56

Type Values Removed Values Added
References (CONFIRM) https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2 - (CONFIRM) https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2 - Issue Tracking, Third Party Advisory
References (MISC) https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e - (MISC) https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 5.9
First Time Envoyproxy
Envoyproxy envoy
CPE cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

22 Feb 2022, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-22 23:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-21656

Mitre link : CVE-2022-21656

CVE.ORG link : CVE-2022-21656


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')

CWE-295

Improper Certificate Validation