CVE-2022-31733

Source
https://cve.org/CVERecord?id=CVE-2022-31733
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-31733.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-31733
Published
2023-02-03T19:15:11.107Z
Modified
2025-12-09T12:02:29.862206Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is enabled AND unproxied ports are turned off, then an attacker could connect to an application that should be only reachable via mTLS, without presenting a client certificate.

References

Affected packages

Git / github.com/cloudfoundry/cf-deployment

Affected ranges

Type
GIT
Repo
https://github.com/cloudfoundry/cf-deployment
Events

Affected versions

v17.*
v17.1.0
v18.*
v18.0.0
v19.*
v19.0.0
v20.*
v20.0.0
v20.1.0
v20.2.0
v20.3.0
v20.4.0
v21.*
v21.0.0
v21.1.0
v21.10.0
v21.11.0
v21.2.0
v21.3.0
v21.4.0
v21.5.0
v21.6.0
v21.7.0
v21.8.0
v21.9.0
v22.*
v22.0.0
v22.1.0
v22.2.0
v23.*
v23.0.0
v23.1.0
v23.2.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-31733.json"

Git / github.com/cloudfoundry/diego-release

Affected ranges

Type
GIT
Repo
https://github.com/cloudfoundry/diego-release
Events

Affected versions

v2.*
v2.55.0
v2.56.0
v2.56.1
v2.57.0
v2.58.0
v2.58.1
v2.59.0
v2.61.0
v2.62.0
v2.63.0
v2.64.0
v2.65.0
v2.65.1
v2.66.0
v2.66.1
v2.66.2
v2.66.3
v2.66.4
v2.67.0
v2.68.0
v2.69.0
vv2.*
vv2.66.1
vv2.66.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-31733.json"