The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade envoyproxy/envoy
to version 1.20.2 or higher.
Affected versions of this package are vulnerable to Improper Certificate Validation. The default_validator.cc
implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames
. This processing allows, for example, an rfc822Name
or uniformResourceIndicator
to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints
, as processed by the underlying OpenSSL/BoringSSL
implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.