// For flags

CVE-2022-23635

Unauthenticated control plane denial of service attack in Istio

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/) topologies, this port is exposed over the public internet. There are no effective workarounds, beyond upgrading. Limiting network access to Istiod to the minimal set of clients can help lessen the scope of the vulnerability to some extent.

Istio es una plataforma abierta para conectar, gestionar y asegurar microservicios. En las versiones afectadas, el plano de control de Istio, `istiod`, es vulnerable a un error de procesamiento de solicitudes, lo que permite a un atacante malicioso que envíe un mensaje especialmente diseñado que resulte en la caída del plano de control. Este punto final se sirve a través del puerto 15012 de TLS, pero no requiere ninguna autenticación por parte del atacante. Para instalaciones sencillas, Istiod normalmente sólo es alcanzable desde dentro del clúster, limitando el radio de explosión. Sin embargo, para algunos despliegues, especialmente las topologías [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/), este puerto está expuesto a través de la Internet pública. No hay medidas de mitigación adicionales efectivas, más allá de la actualización. Limitar el acceso a la red a Istiod al conjunto mínimo de clientes puede ayudar a reducir el alcance de la vulnerabilidad hasta cierto punto

A flaw was found in istio. This flaw allows an attacker to send a specially crafted message to isitiod, causing the control plane to crash.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-19 CVE Reserved
  • 2022-02-22 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-09-02 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
  • CWE-1284: Improper Validation of Specified Quantity in Input
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Istio
Search vendor "Istio"
Istio
Search vendor "Istio" for product "Istio"
< 1.11.7
Search vendor "Istio" for product "Istio" and version " < 1.11.7"
-
Affected
Istio
Search vendor "Istio"
Istio
Search vendor "Istio" for product "Istio"
>= 1.12.0 < 1.12.4
Search vendor "Istio" for product "Istio" and version " >= 1.12.0 < 1.12.4"
-
Affected
Istio
Search vendor "Istio"
Istio
Search vendor "Istio" for product "Istio"
>= 1.13.0 < 1.13.1
Search vendor "Istio" for product "Istio" and version " >= 1.13.0 < 1.13.1"
-
Affected