This security bulletin contains one high risk vulnerability.
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in the Authentication Policy exact-path matching logic. A remote attacker can bypass authentication process and gain unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token.Mitigation
Install updates from vendor's website.Vulnerable software versions
Istio: 1.3 - 1.4.3Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?