CVE-2020-8660
envoy: TLS inspector bypassc
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some security restrictions in the process.
Una omisión del inspector TLS de CNCF Envoy versiones hasta 1.13.0. El inspector TLS podría haber sido omitido (no reconocido como cliente TLS) por un cliente que usa solo TLS versión 1.3. Debido a que las extensiones TLS (SNI, ALPN) no fueron inspeccionadas, esas conexiones podrían haber coincidido con una cadena de filtro errónea, posiblemente omitiendo algunas restricciones de seguridad en el proceso.
An access control bypass vulnerability was found in envoy. An attacker could send specially crafted packets over TLS v1.3 to possibly bypass security restrictions.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-02-06 CVE Reserved
- 2020-03-04 CVE Published
- 2024-01-07 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-345: Insufficient Verification of Data Authenticity
- CWE-358: Improperly Implemented Security Check for Standard
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/envoyproxy/envoy/security/advisories/GHSA-c4g8-7grc-5wvx | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2020:0734 | 2020-07-13 | |
https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history | 2020-07-13 | |
https://access.redhat.com/security/cve/CVE-2020-8660 | 2020-03-05 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1802545 | 2020-03-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Envoyproxy Search vendor "Envoyproxy" | Envoy Search vendor "Envoyproxy" for product "Envoy" | < 1.12.3 Search vendor "Envoyproxy" for product "Envoy" and version " < 1.12.3" | - |
Affected
| ||||||
Envoyproxy Search vendor "Envoyproxy" | Envoy Search vendor "Envoyproxy" for product "Envoy" | >= 1.13.0 < 1.13.1 Search vendor "Envoyproxy" for product "Envoy" and version " >= 1.13.0 < 1.13.1" | - |
Affected
|