Lucene search

K
cvelistPalantirCVELIST:CVE-2022-27890
HistoryFeb 16, 2023 - 12:00 a.m.

CVE-2022-27890

2023-02-1600:00:00
CWE-297
Palantir
www.cve.org
1
sls-logging
tls certificates
javax.net.ssl.sslsocketfactory
man-in-the-middle
network communications
atlasdb
two-way tls
palantir platform
upgrading

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N

EPSS

0.001

Percentile

39.8%

It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of AtlasDB, the vulnerability was mitigated by other network controls such as two-way TLS when deployed as part of a Palantir platform. Palantir still recommends upgrading to a non-vulnerable version out of an abundance of caution.

CNA Affected

[
  {
    "vendor": "Palantir",
    "product": "AtlasDB",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "0.730.0",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N

EPSS

0.001

Percentile

39.8%

Related for CVELIST:CVE-2022-27890