Denial of service attack due to Go Regex Library.
|CVSS Impact Score||7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H|
|Affected Releases||All releases prior to 1.13|
1.13.0 to 1.13.8
1.14.0 to 1.14.4
1.15.0 to 1.15.1
- CVE-2022-39278: (CVSS Score 7.5, High): Denial of service attack due to Go Regex Library.
The Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted or oversized message, to crash the control plane process. This can be exploited when the Kubernetes validating or mutating webhook service is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from an attacker.
For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially those where the control plane runs in a different cluster, this port is exposed over the public internet.
The following Go issue points to the security vulnerability caused by the Go regex library. It is publicly fixed in Go 1.18.7 and Go 1.19.2
Am I Impacted?
You are at most risk if you are running Istio in an external istiod environment, or if you have exposed your istiod externally and you are using any of the affected Istio versions.