Multiple vulnerabilities in Istio



Published: 2022-01-19
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2022-21679
CVE-2022-21701
CWE-ID CWE-285
CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Istio
Web applications / Other software

Vendor Istio

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper Authorization

EUVDB-ID: #VU59823

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21679

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authorization check.

The vulnerability exists due to incorrect configuration for proxies in the "hosts" and "notHosts" fields. A remote attacker can cause requests to accidentally bypass or get rejected by the authorization policy.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Istio: 1.12.0 - 1.12.1

External links

http://istio.io/latest/news/security/istio-security-2022-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU59825

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21701

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Kubernetes Gateway API, which leads to security restrictions bypass and privilege escalation.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Istio: 1.12.0 - 1.12.1

External links

http://istio.io/latest/news/security/istio-security-2022-002


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###