Описание
Nebula is a scalable overlay networking tool. In versions from 1.7.0 to 1.10.2, when using P256 certificates (which is not the default configuration), it is possible to evade a blocklist entry created against the fingerprint of a certificate by using ECDSA Signature Malleability to use a copy of the certificate with a different fingerprint. This issue has been patched in version 1.10.3.
A flaw was found in Nebula, a scalable overlay networking tool. When configured to use P256 certificates, an attacker can exploit Elliptic Curve Digital Signature Algorithm (ECDSA) Signature Malleability. This allows the attacker to create a modified copy of a certificate with a different fingerprint, thereby evading existing blocklist entries. This could lead to unauthorized network access or bypass of security controls.
Отчет
While the flaw is rated as Important, please keep in mind that there are several preconditions that must be true for a customer to be impacted:
- They must be used CURVE_P256 certificates (which are not the default).
- They must have one or more entries on their blocklist.
- The certificates of those blocklisted entries must be signed by a trusted CA and not expired.
- An attacker must have a copy of the private key and corresponding certificate for one of those blocklist entries.
Меры по смягчению последствий
Avoid configuring Nebula to use P256 certificates. This vulnerability is only exploitable when P256 certificates are explicitly enabled, as they are not the default configuration. Ensure Nebula deployments utilize default or other non-P256 certificate types to prevent blocklist evasion.
Дополнительная информация
Статус:
8.1 High
CVSS3
Связанные уязвимости
Nebula is a scalable overlay networking tool. In versions from 1.7.0 to 1.10.2, when using P256 certificates (which is not the default configuration), it is possible to evade a blocklist entry created against the fingerprint of a certificate by using ECDSA Signature Malleability to use a copy of the certificate with a different fingerprint. This issue has been patched in version 1.10.3.
Blocklist Bypass possible via ECDSA Signature Malleability
8.1 High
CVSS3