Vulnerability Details CVE-2022-21656
Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 3.0%
CVSS Severity
CVSS v3 Score 7.4
CVSS v2 Score 5.8
Products affected by CVE-2022-21656
-
cpe:2.3:a:envoyproxy:envoy:-
-
cpe:2.3:a:envoyproxy:envoy:1.0.0
-
cpe:2.3:a:envoyproxy:envoy:1.1.0
-
cpe:2.3:a:envoyproxy:envoy:1.10.0
-
cpe:2.3:a:envoyproxy:envoy:1.11.0
-
cpe:2.3:a:envoyproxy:envoy:1.11.1
-
cpe:2.3:a:envoyproxy:envoy:1.11.2
-
cpe:2.3:a:envoyproxy:envoy:1.12.0
-
cpe:2.3:a:envoyproxy:envoy:1.12.1
-
cpe:2.3:a:envoyproxy:envoy:1.12.2
-
cpe:2.3:a:envoyproxy:envoy:1.12.3
-
cpe:2.3:a:envoyproxy:envoy:1.12.4
-
cpe:2.3:a:envoyproxy:envoy:1.12.5
-
cpe:2.3:a:envoyproxy:envoy:1.12.6
-
cpe:2.3:a:envoyproxy:envoy:1.12.7
-
cpe:2.3:a:envoyproxy:envoy:1.13.0
-
cpe:2.3:a:envoyproxy:envoy:1.13.1
-
cpe:2.3:a:envoyproxy:envoy:1.13.2
-
cpe:2.3:a:envoyproxy:envoy:1.13.3
-
cpe:2.3:a:envoyproxy:envoy:1.13.4
-
cpe:2.3:a:envoyproxy:envoy:1.13.5
-
cpe:2.3:a:envoyproxy:envoy:1.13.6
-
cpe:2.3:a:envoyproxy:envoy:1.13.7
-
cpe:2.3:a:envoyproxy:envoy:1.13.8
-
cpe:2.3:a:envoyproxy:envoy:1.14.0
-
cpe:2.3:a:envoyproxy:envoy:1.14.1
-
cpe:2.3:a:envoyproxy:envoy:1.14.2
-
cpe:2.3:a:envoyproxy:envoy:1.14.3
-
cpe:2.3:a:envoyproxy:envoy:1.14.4
-
cpe:2.3:a:envoyproxy:envoy:1.14.5
-
cpe:2.3:a:envoyproxy:envoy:1.14.6
-
cpe:2.3:a:envoyproxy:envoy:1.14.7
-
cpe:2.3:a:envoyproxy:envoy:1.15.0
-
cpe:2.3:a:envoyproxy:envoy:1.15.1
-
cpe:2.3:a:envoyproxy:envoy:1.15.2
-
cpe:2.3:a:envoyproxy:envoy:1.15.3
-
cpe:2.3:a:envoyproxy:envoy:1.15.4
-
cpe:2.3:a:envoyproxy:envoy:1.15.5
-
cpe:2.3:a:envoyproxy:envoy:1.16.0
-
cpe:2.3:a:envoyproxy:envoy:1.16.1
-
cpe:2.3:a:envoyproxy:envoy:1.16.2
-
cpe:2.3:a:envoyproxy:envoy:1.16.3
-
cpe:2.3:a:envoyproxy:envoy:1.16.4
-
cpe:2.3:a:envoyproxy:envoy:1.16.5
-
cpe:2.3:a:envoyproxy:envoy:1.17.0
-
cpe:2.3:a:envoyproxy:envoy:1.17.1
-
cpe:2.3:a:envoyproxy:envoy:1.17.2
-
cpe:2.3:a:envoyproxy:envoy:1.17.3
-
cpe:2.3:a:envoyproxy:envoy:1.17.4
-
cpe:2.3:a:envoyproxy:envoy:1.18.0
-
cpe:2.3:a:envoyproxy:envoy:1.18.1
-
cpe:2.3:a:envoyproxy:envoy:1.18.2
-
cpe:2.3:a:envoyproxy:envoy:1.18.3
-
cpe:2.3:a:envoyproxy:envoy:1.18.4
-
cpe:2.3:a:envoyproxy:envoy:1.19.0
-
cpe:2.3:a:envoyproxy:envoy:1.19.1
-
cpe:2.3:a:envoyproxy:envoy:1.19.3
-
cpe:2.3:a:envoyproxy:envoy:1.19.4
-
cpe:2.3:a:envoyproxy:envoy:1.19.5
-
cpe:2.3:a:envoyproxy:envoy:1.2.0
-
cpe:2.3:a:envoyproxy:envoy:1.20.0
-
cpe:2.3:a:envoyproxy:envoy:1.20.1
-
cpe:2.3:a:envoyproxy:envoy:1.3.0
-
cpe:2.3:a:envoyproxy:envoy:1.4.0
-
cpe:2.3:a:envoyproxy:envoy:1.5.0
-
cpe:2.3:a:envoyproxy:envoy:1.6.0
-
cpe:2.3:a:envoyproxy:envoy:1.7.0
-
cpe:2.3:a:envoyproxy:envoy:1.7.1
-
cpe:2.3:a:envoyproxy:envoy:1.8.0
-
cpe:2.3:a:envoyproxy:envoy:1.9.0
-
cpe:2.3:a:envoyproxy:envoy:1.9.1