Redhat Openshift Service Mesh vulnerabilities

20 known vulnerabilities affecting redhat/openshift_service_mesh.

Total CVEs
20
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL2HIGH15MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2025-0752HIGHCVSS 7.1v2.5.6v2.6.32025-01-28
CVE-2025-0752 [HIGH] CWE-444 CVE-2025-0752: A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control b A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
nvd
CVE-2023-44487HIGHCVSS 7.5KEVPoCv2.02023-10-10
CVE-2023-44487 [HIGH] CWE-400 CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancell The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
nvd
CVE-2022-3962MEDIUMCVSS 4.3v2.3.12023-09-23
CVE-2022-3962 [MEDIUM] CWE-74 CVE-2022-3962: A content spoofing vulnerability was found in Kiali. It was discovered that Kiali does not implement A content spoofing vulnerability was found in Kiali. It was discovered that Kiali does not implement error handling when the page or endpoint being accessed cannot be found. This issue allows an attacker to perform arbitrary text injection when an error response is retrieved from the URL being accessed.
nvd
CVE-2021-3586CRITICALCVSS 9.8v2.02022-08-22
CVE-2021-3586 [CRITICAL] CWE-1188 CVE-2021-3586: A flaw was found in servicemesh-operator. The NetworkPolicy resources installed for Maistra do not p A flaw was found in servicemesh-operator. The NetworkPolicy resources installed for Maistra do not properly specify which ports may be accessed, allowing access to all ports on these resources from any pod. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
nvd
CVE-2021-3495HIGHCVSS 8.8v1.0v2.02021-06-01
CVE-2021-3495 [HIGH] CWE-281 CVE-2021-3495: An incorrect access control flaw was found in the kiali-operator in versions before 1.33.0 and befor An incorrect access control flaw was found in the kiali-operator in versions before 1.33.0 and before 1.24.7. This flaw allows an attacker with a basic level of access to the cluster (to deploy a kiali operand) to use this vulnerability and deploy a given image to anywhere in the cluster, potentially gaining access to privileged service account tokens.
nvd
CVE-2019-25014MEDIUMCVSS 6.5v1.02021-01-29
CVE-2019-25014 [MEDIUM] CWE-476 CVE-2019-25014: A NULL pointer dereference was found in pkg/proxy/envoy/v2/debug.go getResourceVersion in Istio pilo A NULL pointer dereference was found in pkg/proxy/envoy/v2/debug.go getResourceVersion in Istio pilot before 1.5.0-alpha.0. If a particular HTTP GET request is made to the pilot API endpoint, it is possible to cause the Go runtime to panic (resulting in a denial of service to the istio-pilot application).
nvd
CVE-2020-27846CRITICALCVSS 9.8v2.02020-12-21
CVE-2020-27846 [CRITICAL] CWE-115 CVE-2020-27846: A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypas A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
nvd
CVE-2020-1762HIGHCVSS 8.6v1.02020-04-27
CVE-2020-1762 [HIGH] CWE-384 CVE-2020-1762: An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fix An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.
nvd
CVE-2020-1764HIGHCVSS 8.6v1.02020-03-26
CVE-2020-1764 [HIGH] CWE-321 CVE-2020-1764: A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, a A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
nvd
CVE-2020-8661HIGHCVSS 7.5v1.0.92020-03-04
CVE-2020-8661 [HIGH] CWE-400 CVE-2020-8661: CNCF Envoy through 1.13.0 may consume excessive amounts of memory when responding internally to pipe CNCF Envoy through 1.13.0 may consume excessive amounts of memory when responding internally to pipelined requests.
nvd
CVE-2020-8659HIGHCVSS 7.5v1.02020-03-04
CVE-2020-8659 [HIGH] CWE-770 CVE-2020-8659: CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
nvd
CVE-2020-1704HIGHCVSS 7.8fixed in 1.0.82020-02-17
CVE-2020-1704 [HIGH] CWE-266 CVE-2020-1704: An insecure modification vulnerability in the /etc/passwd file was found in all versions of OpenShif An insecure modification vulnerability in the /etc/passwd file was found in all versions of OpenShift ServiceMesh (maistra) before 1.0.8 in the openshift/istio-kialia-rhel7-operator-container. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
nvd
CVE-2020-8595HIGHCVSS 7.3v1.02020-02-12
CVE-2020-8595 [HIGH] CWE-287 CVE-2020-8595: Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authe Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authentication bypass. The Authentication Policy exact-path matching logic can allow unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token. For example, an attacker can add a ? or # character to a
nvd
CVE-2019-9515HIGHCVSS 7.5v1.02019-08-13
CVE-2019-9515 [HIGH] CWE-400 CVE-2019-9515: Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of s Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently th
nvd
CVE-2019-9517HIGHCVSS 7.5v1.02019-08-13
CVE-2019-9517 [HIGH] CWE-400 CVE-2019-9517: Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially lead Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requ
nvd
CVE-2019-9514HIGHCVSS 7.5v1.02019-08-13
CVE-2019-9514 [HIGH] CWE-400 CVE-2019-9514: Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of serv Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both
nvd
CVE-2019-9511HIGHCVSS 7.5v1.02019-08-13
CVE-2019-9511 [HIGH] CWE-400 CVE-2019-9511: Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization man Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. De
nvd
CVE-2019-9513HIGHCVSS 7.5v1.02019-08-13
CVE-2019-9513 [HIGH] CWE-400 CVE-2019-9513: Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of ser Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
nvd
CVE-2019-9518HIGHCVSS 7.5v1.02019-08-13
CVE-2019-9518 [HIGH] CWE-400 CVE-2019-9518: Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a deni Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandw
nvd
CVE-2019-9516MEDIUMCVSS 6.5v1.02019-08-13
CVE-2019-9516 [MEDIUM] CWE-400 CVE-2019-9516: Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of serv Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the
nvd