#VU25386 Improper Authentication in Istio - CVE-2020-8843
Published: February 17, 2020
Istio
Istio
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in Mixer policy checks. Istio-proxy accepts x-istio-attributes header at ingress that can be used to affect policy decisions when Mixer policy selectively applies to source equal to ingress. A remote attacker can bypass authentication process and gain unauthorized access to the application.