// For flags

CVE-2021-27098

 

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server’s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1.

En SPIRE versiones 0.8.1 hasta 0.8.4 y versiones anteriores a 0.9.4, 0.10.2, 0.11.3 y 0.12.1, unas peticiones especialmente diseñadas para FetchX509SVID RPC de la API del Legacy Node de SPIRE Server, pueden resultar en una posible emisión de un Certificado X.509 con un URI SAN para un ID de SPIFFE que el agente no está autorizado a distribuir. Se presentan controles apropiados para requerir que la persona que llama presente un certificado de agente válido que ya esté autorizado para emitir al menos un ID de SPIFFE, y que el ID de SPIFFE pedido pertenezca al mismo dominio confiable, antes de poder desencadenar esta vulnerabilidad. Este problema ha sido corregido en versiones 0.8.5, 0.9.4, 0.10.2, 0.11.3 y 0.12.1 de SPIRE

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-02-10 CVE Reserved
  • 2021-03-05 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-295: Improper Certificate Validation
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cncf
Search vendor "Cncf"
Spire
Search vendor "Cncf" for product "Spire"
>= 0.8.1 <= 0.8.4
Search vendor "Cncf" for product "Spire" and version " >= 0.8.1 <= 0.8.4"
-
Affected
Cncf
Search vendor "Cncf"
Spire
Search vendor "Cncf" for product "Spire"
>= 0.9.0 < 0.9.4
Search vendor "Cncf" for product "Spire" and version " >= 0.9.0 < 0.9.4"
-
Affected
Cncf
Search vendor "Cncf"
Spire
Search vendor "Cncf" for product "Spire"
>= 0.10.0 < 0.10.2
Search vendor "Cncf" for product "Spire" and version " >= 0.10.0 < 0.10.2"
-
Affected
Cncf
Search vendor "Cncf"
Spire
Search vendor "Cncf" for product "Spire"
>= 0.11.0 < 0.11.3
Search vendor "Cncf" for product "Spire" and version " >= 0.11.0 < 0.11.3"
-
Affected
Cncf
Search vendor "Cncf"
Spire
Search vendor "Cncf" for product "Spire"
>= 0.12.0 < 0.12.1
Search vendor "Cncf" for product "Spire" and version " >= 0.12.0 < 0.12.1"
-
Affected