#VU69268 Improper access control in Istio


Published: 2022-11-14

Vulnerability identifier: #VU69268

Vulnerability risk: Low

CVSSv3.1: 6.6 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-39388

CWE-ID: CWE-284

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Istio
Web applications / Other software

Vendor: Istio

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user on the local network can impersonate any workload identity within the service mesh.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Istio: 1.15.0 - 1.15.2


External links
http://github.com/istio/istio/security/advisories/GHSA-6c6p-h79f-g6p4
http://github.com/istio/istio/commit/9a643e270421560afb2630e00f76d46a55499df9
http://istio.io/latest/news/releases/1.15.x/announcing-1.15.3/
http://github.com/istio/istio/commit/346260e5115e9fbc65ba8a559bc686e6ca046a32


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability