Lucene search

K
cve[email protected]CVE-2022-31733
HistoryFeb 03, 2023 - 7:15 p.m.

CVE-2022-31733

2023-02-0319:15:11
CWE-295
web.nvd.nist.gov
466
2
cve
2022
31733
diego-release
cf deployment
mtls
route integrity
security vulnerability

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.8%

Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is enabled AND unproxied ports are turned off, then an attacker could connect to an application that should be only reachable via mTLS, without presenting a client certificate.

Affected configurations

NVD
Node
cloudfoundrycf-deploymentRange17.123.2.0
OR
cloudfoundrydiegoRange2.55.02.69.0

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Cloud Foundry Diego and CF Deployment",
    "versions": [
      {
        "version": "Affected versions of Diego are all versions between 2.55.0 and 2.69.0 (inclusive) and affected versions of CF Deployment are all versions between 17.1 and 23.2.0 (inclusive).",
        "status": "affected"
      }
    ]
  }
]

Social References

More

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.8%

Related for CVE-2022-31733