CVE-2022-21656

HIGH

Envoy < 1.20.2 - Improper Certificate Validation

Title source: rule
STIX 2.1

Description

Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.

References (2)

Core 2
Core References
Issue Tracking, Third Party Advisory x_refsource_confirm
https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2

Scores

CVSS v3 7.4
EPSS 0.0002
EPSS Percentile 3.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-295 CWE-843
Status published
Products (1)
envoyproxy/envoy < 1.20.2
Published Feb 22, 2022
Tracked Since Feb 18, 2026