CVE-2022-21654

Source
https://cve.org/CVERecord?id=CVE-2022-21654
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-21654.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-21654
Aliases
Downstream
Published
2022-02-22T22:35:11Z
Modified
2026-04-11T12:38:35.251706Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Incorrect configuration handling allows TLS session re-use without re-validation in Envoy
Details

Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-295"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/21xxx/CVE-2022-21654.json"
}
References

Affected packages

Git / github.com/envoyproxy/envoy

Affected ranges

Type
GIT
Repo
https://github.com/envoyproxy/envoy
Events
Database specific
{
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ],
    "cpe": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "1.7.0"
        },
        {
            "fixed": "1.18.6"
        },
        {
            "introduced": "1.19.0"
        },
        {
            "fixed": "1.19.3"
        },
        {
            "introduced": "1.20.0"
        },
        {
            "fixed": "1.20.2"
        },
        {
            "introduced": "1.21.0"
        },
        {
            "fixed": "1.21.1"
        }
    ]
}

Affected versions

v1.*
v1.10.0
v1.11.0
v1.12.0
v1.13.0
v1.14.0
v1.15.0
v1.16.0
v1.17.0
v1.18.0
v1.18.1
v1.18.2
v1.18.3
v1.18.4
v1.19.0
v1.19.1
v1.20.0
v1.20.1
v1.21.0
v1.7.0
v1.8.0
v1.9.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-21654.json"