// For flags

CVE-2022-31034

Insecure entropy in argo-cd

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v0.11.0 are vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or UI. The vulnerabilities are due to the use of insufficiently random values in parameters in Oauth2/OIDC login flows. In each case, using a relatively-predictable (time-based) seed in a non-cryptographically-secure pseudo-random number generator made the parameter less random than required by the relevant spec or by general best practices. In some cases, using too short a value made the entropy even less sufficient. The attacks on login flows which are meant to be mitigated by these parameters are difficult to accomplish but can have a high impact potentially granting an attacker admin access to Argo CD. Patches for this vulnerability has been released in the following Argo CD versions: v2.4.1, v2.3.5, v2.2.10 and v2.1.16. There are no known workarounds for this vulnerability.

Argo CD es una herramienta declarativa de entrega continua GitOps para Kubernetes. Todas las versiones de Argo CD a partir de la v0.11.0, son vulnerables a una variedad de ataques cuando es iniciado un inicio de sesión SSO desde la CLI o la UI de Argo CD. Las vulnerabilidades son debido a un uso de valores insuficientemente aleatorios en los parámetros de los flujos de inicio de sesión Oauth2/OIDC. En cada caso, el uso de una semilla relativamente predecible (basada en el tiempo) en un generador de números pseudoaleatorios no seguro desde el punto de vista criptográfico hizo que el parámetro fuera menos aleatorio de lo requerido por la especificación correspondiente o por las mejores prácticas generales. En algunos casos, el uso de un valor demasiado corto hacía que la entropía fuera aún menos suficiente. Los ataques a los flujos de inicio de sesión que pretenden mitigarse con estos parámetros son difíciles de llevar a cabo, pero pueden tener un alto impacto, pudiendo conceder a un atacante acceso de administrador a Argo CD. Han sido publicados parches para esta vulnerabilidad en las siguientes versiones de Argo CD: v2.4.1, v2.3.5, v2.2.10 y v2.1.16. No son conocidas mitigaciones para esta vulnerabilidad

Several Single sign-on (SSO) vulnerabilities were found in ArgoCD when the login process is initiated via CLI or UI interfaces. The vulnerabilities are related to using insufficiently random value parameters during the login process. This flaw gives the attacker elevated privileges, including the possibility of administrative rights.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-06-22 CVE Published
  • 2024-01-18 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-330: Use of Insufficiently Random Values
  • CWE-331: Insufficient Entropy
  • CWE-335: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linuxfoundation
Search vendor "Linuxfoundation"
Argo-cd
Search vendor "Linuxfoundation" for product "Argo-cd"
>= 0.11.0 < 2.1.16
Search vendor "Linuxfoundation" for product "Argo-cd" and version " >= 0.11.0 < 2.1.16"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Argo-cd
Search vendor "Linuxfoundation" for product "Argo-cd"
2.2.9
Search vendor "Linuxfoundation" for product "Argo-cd" and version "2.2.9"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Argo-cd
Search vendor "Linuxfoundation" for product "Argo-cd"
2.3.4
Search vendor "Linuxfoundation" for product "Argo-cd" and version "2.3.4"
-
Affected
Linuxfoundation
Search vendor "Linuxfoundation"
Argo-cd
Search vendor "Linuxfoundation" for product "Argo-cd"
2.4.0
Search vendor "Linuxfoundation" for product "Argo-cd" and version "2.4.0"
-
Affected