Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04NTZxLXh2M2MtN2YyZs0uLQ

Unauthenticated control plane denial of service attack in Istio

Impact

The Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker.

For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially multicluster topologies, this port is exposed over the public internet.

Patches

Workarounds

There are no effective workarounds, beyond upgrading. Limiting network access to Istiod to the minimal set of clients can help lessen the scope of the vulnerability to some extent.

References

More details can be found in the Istio Security Bulletin

For more information

If you have any questions or comments about this advisory, please email us at [email protected]

Permalink: https://github.com/advisories/GHSA-856q-xv3c-7f2f
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04NTZxLXh2M2MtN2YyZs0uLQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 10 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-856q-xv3c-7f2f, CVE-2022-23635
References: Repository: https://github.com/istio/istio
Blast Radius: 16.3

Affected Packages

go:istio.io/istio
Dependent packages: 119
Dependent repositories: 149
Downloads:
Affected Version Ranges: < 1.11.7, >= 1.12.0, < 1.12.4, = 1.13.0
Fixed in: 1.11.7, 1.12.4, 1.13.1
All affected versions:
All unaffected versions: