Vulnerability identifier: #VU64153
Vulnerability risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-31045
CWE-ID:
CWE-125
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Istio
Web applications /
Other software
Vendor: Istio
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the Ill-formed headers. A remote attacker can trigger out-of-bounds read error and cause a denial of service condition on the system.
Mitigation
Install updates from vendor's website.
Note, the 1.14.2 or 1.13.6 versions are affected by this vulnerability due to process issues on the vendor's side.
Vulnerable software versions
Istio: 0.1 - 0.1.6, 0.2 - 0.2.12, 0.3 - 0.3.0, 0.4 - 0.4.0, 0.5 - 0.5.1, 0.6 - 0.6.0, 0.7 - 0.7.1, 0.8 - 0.8.0, 1.0 - 1.0.9, 1.1 - 1.14.2, 1.2 - 1.2.10, 1.3 - 1.3.8, 1.4 - 1.4.10, 1.5.0 - 1.5.10, 1.6.0 - 1.6.14, 1.7.0 - 1.7.8, 1.8.0 - 1.8.6, 1.9.0 - 1.9.9
External links
https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x
https://istio.io/latest/news/security/istio-security-2022-05
https://istio.io/latest/news/security/istio-security-2022-006
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.