Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 | Patch Third Party Advisory | 
| https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283 | Issue Tracking Third Party Advisory | 
| https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 | Patch Third Party Advisory | 
| https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283 | Issue Tracking Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 06:45
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 6.8 v3 : 7.4 | 
| References | () https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 - Patch, Third Party Advisory | |
| References | () https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283 - Issue Tracking, Third Party Advisory | 
Information
                Published : 2022-02-22 23:15
Updated : 2024-11-21 06:45
NVD link : CVE-2022-21654
Mitre link : CVE-2022-21654
CVE.ORG link : CVE-2022-21654
JSON object : View
Products Affected
                envoyproxy
- envoy
CWE
                
                    
                        
                        CWE-295
                        
            Improper Certificate Validation
