Improper access control in envoy - CVE-2020-8664

 

Improper access control in envoy - CVE-2020-8664

Published: March 9, 2020


Vulnerability identifier: #VU25838
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-8664
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cloud Native Computing Foundation
Affected software:
envoy

Detailed vulnerability description

The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.

The vulnerability exists due to improper access restrictions when using SDS with Combined Validation Context. A remote attacker can use the same secret (e.g. trusted CA) across many resources together with the combined validation context and gain unauthorized access to the affected application


How to mitigate CVE-2020-8664

Install update from vendor's website.

Sources