CVE-2022-31733

Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is enabled AND unproxied ports are turned off, then an attacker could connect to an application that should be only reachable via mTLS, without presenting a client certificate.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:cloudfoundry:diego:*:*:*:*:*:*:*:*

History

10 Feb 2023, 17:37

Type Values Removed Values Added
CPE cpe:2.3:a:cloudfoundry:diego:*:*:*:*:*:*:*:*
cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
CWE CWE-295
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
References (MISC) https://www.cloudfoundry.org/blog/cve-2022-31733-unsecured-application-port - (MISC) https://www.cloudfoundry.org/blog/cve-2022-31733-unsecured-application-port - Vendor Advisory
First Time Cloudfoundry
Cloudfoundry diego
Cloudfoundry cf-deployment

03 Feb 2023, 19:50

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-03 19:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-31733

Mitre link : CVE-2022-31733

CVE.ORG link : CVE-2022-31733


JSON object : View

Products Affected

cloudfoundry

  • diego
  • cf-deployment
CWE
CWE-295

Improper Certificate Validation