MEDIUM · 6.5

CVE-2022-1632

An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate valida...

Vulnerability Description

An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
RedhatAnsible Automation Platform2.0
RedhatOpenshift Container Platform4.0
FedoraprojectFedora34

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-1632?

CVE-2022-1632 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate valida...

How severe is CVE-2022-1632?

CVE-2022-1632 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-1632?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Ansible Automation Platform, Redhat Openshift Container Platform, Fedoraproject Fedora.