Lucene search

K
cvePalantirCVE-2022-27890
HistoryFeb 16, 2023 - 4:15 p.m.

CVE-2022-27890

2023-02-1616:15:11
CWE-295
CWE-297
Palantir
web.nvd.nist.gov
17
cve
2022
27890
tls
certificates
security
vulnerability
network
man-in-the-middle
atlasdb
palantir

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

39.8%

It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of AtlasDB, the vulnerability was mitigated by other network controls such as two-way TLS when deployed as part of a Palantir platform. Palantir still recommends upgrading to a non-vulnerable version out of an abundance of caution.

Affected configurations

Nvd
Node
palantiratlasdbRange<0.730.0
VendorProductVersionCPE
palantiratlasdb*cpe:2.3:a:palantir:atlasdb:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Palantir",
    "product": "AtlasDB",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "0.730.0",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

39.8%

Related for CVE-2022-27890