{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T04:55:25.486","vulnerabilities":[{"cve":{"id":"CVE-2022-23635","sourceIdentifier":"security-advisories@github.com","published":"2022-02-22T22:15:07.620","lastModified":"2024-11-21T06:48:59.143","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/) topologies, this port is exposed over the public internet. There are no effective workarounds, beyond upgrading. Limiting network access to Istiod to the minimal set of clients can help lessen the scope of the vulnerability to some extent."},{"lang":"es","value":"Istio es una plataforma abierta para conectar, gestionar y asegurar microservicios. En las versiones afectadas, el plano de control de Istio, `istiod`, es vulnerable a un error de procesamiento de solicitudes, lo que permite a un atacante malicioso que envíe un mensaje especialmente diseñado que resulte en la caída del plano de control. Este punto final se sirve a través del puerto 15012 de TLS, pero no requiere ninguna autenticación por parte del atacante. Para instalaciones sencillas, Istiod normalmente sólo es alcanzable desde dentro del clúster, limitando el radio de explosión. Sin embargo, para algunos despliegues, especialmente las topologías [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/), este puerto está expuesto a través de la Internet pública. No hay medidas de mitigación adicionales efectivas, más allá de la actualización. Limitar el acceso a la red a Istiod al conjunto mínimo de clientes puede ayudar a reducir el alcance de la vulnerabilidad hasta cierto punto"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*","versionEndExcluding":"1.11.7","matchCriteriaId":"5F628089-4585-4D6E-9524-F8058D3CAA72"},{"vulnerable":true,"criteria":"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*","versionStartIncluding":"1.12.0","versionEndExcluding":"1.12.4","matchCriteriaId":"B682D44E-A685-43A4-80DE-BE04BA1D13AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*","versionStartIncluding":"1.13.0","versionEndExcluding":"1.13.1","matchCriteriaId":"9D493CB7-63C8-4B0A-A2F4-5697943803B0"}]}]}],"references":[{"url":"https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f","source":"security-advisories@github.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://istio.io/latest/news/security/istio-security-2022-003","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://istio.io/latest/news/security/istio-security-2022-003","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}