CVE-2022-1632

Severity
6.5MEDIUM
EPSS
0.1%
top 69.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 1
Latest updateSep 2

Description

An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

โ–ถCVEListV5openshift4.8.17

Also affects: Openshift Container Platform 4.0, Fedora 34, 35

๐Ÿ”ดVulnerability Details

2
GHSA
GHSA-x47w-fx67-qh3w: An Improper Certificate Validation attack was found in Openshiftโ†—2022-09-02
โ–ถ
CVEList
CVE-2022-1632: An Improper Certificate Validation attack was found in Openshiftโ†—2022-09-01
โ–ถ

๐Ÿ“‹Vendor Advisories

1
Red Hat
Openshift: ClusterIP Service TLS certificate not checked by route controller if re-encrypt Route destinationCACertificate field is explicitly set to default serviceCAโ†—2022-01-18
โ–ถ