Security restrictions bypass in Istio



Published: 2021-06-25
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-34824
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Istio
Web applications / Other software

Vendor Istio

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU54381

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-34824

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to application does not properly impose security restrictions.

The Istio Gateway and DestinationRule can load private keys and certificates from Kubernetes secrets via the credentialName configuration. For Istio 1.8 and above, the secrets are conveyed from Istiod to gateways or workloads via the XDS API.

In the above approach, a gateway or workload deployment should only be able to access credentials (TLS certificates and private keys) stored in the Kubernetes secrets within its namespace. However, a bug in Istiod permits an authorized client the ability to access and retrieve any TLS certificate and private key cached in Istiod.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Istio: 1.8.0 - 1.10.1


CPE2.3 External links

http://istio.io/latest/news/security/istio-security-2021-007

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###