Search for vulnerabilities
Vulnerability ID | VCID-djk7-dd9y-aaaf |
Aliases |
CVE-2023-35941
|
Summary | Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 8.8 |
Risk | 4.4 |
Affected and Fixed Packages | Package Details |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35941.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2023-35941 | ||
https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55 | ||
2217977 | https://bugzilla.redhat.com/show_bug.cgi?id=2217977 | |
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | |
CVE-2023-35941 | https://nvd.nist.gov/vuln/detail/CVE-2023-35941 | |
ISTIO-SECURITY-2023-003 | https://istio.io/latest/news/security/ISTIO-SECURITY-2023-003/ | |
RHSA-2023:4624 | https://access.redhat.com/errata/RHSA-2023:4624 | |
RHSA-2023:4625 | https://access.redhat.com/errata/RHSA-2023:4625 | |
RHSA-2023:5175 | https://access.redhat.com/errata/RHSA-2023:5175 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.12327 |
EPSS Score | 0.00042 |
Published At | April 15, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |