Bug 1955396 (CVE-2021-31921)

Summary: CVE-2021-31921 istio/istio: authorization bypass when using AUTO_PASSTHROUGH
Product: [Other] Security Response Reporter: Mark Cooper <mcooper>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: askrabec, jwendell, kconner, rcernich, security-response-team, twalsh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: istio/istio 1.9.5, istio/istio 1.8.6 Doc Type: If docs needed, set a value
Doc Text:
An authorization bypass vulnerability was found in istio. When the istio gateway is configured with TLS mode `AUTO_PASSTHROUGH`, it is possible for a malicious user to bypass the authorization checks and gain access to protected services. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-05-20 14:57:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1955392    

Description Mark Cooper 2021-04-30 03:29:04 UTC
A unauthorized access vulnerability was found in istio/istio in all versions thru 1.9. When the Istio Gateway is configured with TLS mode `AUTO_PASSTHROUGH`, it is possible for a user to bypass the authorization checks access protected services. 

[1] https://istio.io/latest/docs/reference/config/networking/gateway/

Comment 1 Mark Cooper 2021-04-30 03:29:06 UTC
Acknowledgments:

Name: the Istio Product Security Working Group

Comment 6 Mark Cooper 2021-05-12 01:23:57 UTC
External References:

https://istio.io/latest/news/security/istio-security-2021-006/

Comment 8 errata-xmlrpc 2021-05-20 11:11:49 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 2.0

Via RHSA-2021:2061 https://access.redhat.com/errata/RHSA-2021:2061

Comment 9 Product Security DevOps Team 2021-05-20 14:57:22 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-31921

Comment 10 errata-xmlrpc 2021-05-20 19:32:25 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 1.1

Via RHSA-2021:2085 https://access.redhat.com/errata/RHSA-2021:2085