Security restrictions bypass in Istio

This security advisory describes one medium risk vulnerability.


1) Security restrictions bypass


Risk: Medium


CVSSv3.1: 6.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C] [PCI]


CVE-ID: CVE-2021-34824


CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls


Exploit availability: No


Description

The vulnerability allows a remote user to gain access to sensitive information.


The vulnerability exists due to application does not properly impose security restrictions.


The Istio Gateway and DestinationRule can load private keys and certificates from Kubernetes secrets via the credentialName configuration. For Istio 1.8 and above, the secrets are conveyed from Istiod to gateways or workloads via the XDS API.


In the above approach, a gateway or workload deployment should only be able to access credentials (TLS certificates and private keys) stored in the Kubernetes secrets within its namespace. However, a bug in Istiod permits an authorized client the ability to access and retrieve any TLS certificate and private key cached in Istiod.


Mitigation

Install updates from vendor's website.


Vulnerable software versions

Istio: 1.8.0, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.8.5, 1.8.6, 1.9.0, 1.9.1, 1.9.2, 1.9.3, 1.9.4, 1.9.5, 1.10.0, 1.10.1


CPE
External links

https://istio.io/latest/news/ ..

Support the originator by clicking the read the rest link below.