Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-31838

Опубликовано: 10 мар. 2026
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A flaw was found in Istio. This vulnerability in Envoy's Role-Based Access Control (RBAC) header matching could allow an attacker to bypass authorization policies. By crafting requests with multiple header values, an attacker could cause Envoy to misinterpret the header, leading to unauthorized access to protected services.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
cert-manager Operator for Red Hat OpenShiftcert-manager/cert-manager-istio-csr-rhel9Fix deferred
cert-manager Operator for Red Hat OpenShiftcert-manager/cert-manager-operator-bundleFix deferred
cert-manager Operator for Red Hat OpenShiftcert-manager/cert-manager-operator-rhel9Fix deferred
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-acmesolver-rhel9Fix deferred
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-rhel9Fix deferred
ExternalDNS Operatoredo/external-dns-rhel8Fix deferred
ExternalDNS Operatoredo/external-dns-rhel9Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-eventing-istio-controller-rhel9Under investigation
OpenShift Serverlessopenshift-serverless-1/net-istio-controller-rhel9Under investigation
OpenShift Serverlessopenshift-serverless-1/net-istio-webhook-rhel9Under investigation

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-551
https://bugzilla.redhat.com/show_bug.cgi?id=2446342istio: Istio: Authorization policy bypass via Envoy RBAC header matching with multiple header values

EPSS

Процентиль: 12%
0.00039
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
17 дней назад

Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a vulnerability in Envoy RBAC header matching could allow authorization policy bypass when policies rely on HTTP headers that may contain multiple values. An attacker could craft requests with multiple header values in a way that causes Envoy to evaluate the header differently than intended, potentially bypassing authorization checks. This may allow unauthorized requests to reach protected services when policies depend on such header-based matching conditions. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.

EPSS

Процентиль: 12%
0.00039
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2026-31838