Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-34824 |
CWE-ID | CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Istio Web applications / Other software |
Vendor | Istio |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU54381
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-34824
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to application does not properly impose security restrictions.
The Istio Gateway
and
DestinationRule
can load private keys and certificates from Kubernetes
secrets via the credentialName
configuration.
For Istio 1.8 and above, the secrets are conveyed from Istiod to gateways or workloads via the XDS API.
In the above approach, a gateway or workload deployment should only be able to access credentials (TLS certificates and private keys) stored in the Kubernetes secrets within its namespace. However, a bug in Istiod permits an authorized client the ability to access and retrieve any TLS certificate and private key cached in Istiod.
MitigationInstall updates from vendor's website.
Vulnerable software versionsIstio: 1.8.0 - 1.10.1
http://istio.io/latest/news/security/istio-security-2021-007
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?