Improper Authentication in Istio - CVE-2020-8843

 

Improper Authentication in Istio - CVE-2020-8843

Published: February 17, 2020


Vulnerability identifier: #VU25386
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-8843
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Istio
Affected software:
Istio

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in Mixer policy checks. Istio-proxy accepts x-istio-attributes header at ingress that can be used to affect policy decisions when Mixer policy selectively applies to source equal to ingress. A remote attacker can bypass authentication process and gain unauthorized access to the application.


How to mitigate CVE-2020-8843

Install updates from vendor's website.

Sources