{
  "threat_severity" : "Important",
  "public_date" : "2022-02-22T07:00:00Z",
  "bugzilla" : {
    "description" : "envoy: Incorrect configuration handling allows mTLS session re-use without re-validation",
    "id" : "2050753",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2050753"
  },
  "cvss3" : {
    "cvss3_base_score" : "9.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-367",
  "details" : [ "Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.", "A flaw was found in envoy. When certificate validation settings are changed, incorrect configuration handling allows TLS session reuse without revalidation." ],
  "affected_release" : [ {
    "product_name" : "OpenShift Service Mesh 2.0",
    "release_date" : "2022-04-07T00:00:00Z",
    "advisory" : "RHSA-2022:1276",
    "cpe" : "cpe:/a:redhat:service_mesh:2.0::el8",
    "package" : "servicemesh-proxy-0:2.0.9-3.el8"
  }, {
    "product_name" : "OpenShift Service Mesh 2.1",
    "release_date" : "2022-04-07T00:00:00Z",
    "advisory" : "RHSA-2022:1275",
    "cpe" : "cpe:/a:redhat:service_mesh:2.1::el8",
    "package" : "servicemesh-proxy-0:2.1.2-4.el8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-21654\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-21654\nhttps://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283" ],
  "name" : "CVE-2022-21654",
  "csaw" : false
}