Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8660

Опубликовано: 04 мар. 2020
Источник: debian

Описание

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some security restrictions in the process.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
envoyproxyitppackage

Связанные уязвимости

CVSS3: 5.3
redhat
почти 6 лет назад

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some security restrictions in the process.

CVSS3: 5.3
nvd
почти 6 лет назад

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some security restrictions in the process.

CVSS3: 5.3
fstec
почти 6 лет назад

Уязвимость сетевого программного средства Envoy, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю получить доступ к защищаемой информации