Inadequate Encryption Strength Affecting dex package, versions <2.38.0-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Inadequate Encryption Strength vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-WOLFILATEST-DEX-6209198
  • published29 Jan 2024
  • disclosed25 Jan 2024

Introduced: 25 Jan 2024

CVE-2024-23656  (opens in a new tab)
CWE-326  (opens in a new tab)

How to fix?

Upgrade Wolfi dex to version 2.38.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dex package and not the dex package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

Dex is an identity service that uses OpenID Connect to drive authentication for other apps. Dex 2.37.0 serves HTTPS with insecure TLS 1.0 and TLS 1.1. cmd/dex/serve.go line 425 seemingly sets TLS 1.2 as minimum version, but the whole tlsConfig is ignored after TLS cert reloader was introduced in v2.37.0. Configured cipher suites are not respected either. This issue is fixed in Dex 2.38.0.

CVSS Scores

version 3.1