CVE-2022-46153

HIGH

Traefik <2.9.6 - Info Disclosure

Title source: llm
STIX 2.1

Description

Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.

References (4)

Core 4
Core References
Mitigation, Patch, Third Party Advisory x_refsource_confirm
https://github.com/traefik/traefik/security/advisories/GHSA-468w-8x39-gj5v
Product, Vendor Advisory x_refsource_misc
https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/traefik/traefik/releases/tag/v2.9.6

Scores

CVSS v3 8.1
EPSS 0.0040
EPSS Percentile 60.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-295
Status published
Products (2)
traefik/traefik < 2.9.6
traefik/traefik 0 - 2.9.6Go
Published Dec 08, 2022
Tracked Since Feb 18, 2026