Improper Certificate Validation Affecting envoyproxy/envoy package, versions [,1.20.2)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ENVOYPROXYENVOY-2411011
  • published23 Feb 2022
  • disclosed23 Feb 2022
  • creditUnknown

Introduced: 23 Feb 2022

CVE-2022-21656  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade envoyproxy/envoy to version 1.20.2 or higher.

Overview

Affected versions of this package are vulnerable to Improper Certificate Validation. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.

CVSS Scores

version 3.1