Unrated severityNVD Advisory· Published Feb 22, 2022· Updated Apr 23, 2025
Incorrect configuration handling allows TLS session re-use without re-validation in Envoy
CVE-2022-21654
Description
Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.
Affected products
1- Range: >= 1.7.0, < 1.18.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353mitrex_refsource_MISC
- github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.