
Cloud Vulnerability DB
A community-led vulnerabilities database
CNCF Envoy through 1.13.0 contains a TLS inspector bypass vulnerability. The vulnerability allows TLS inspector to be bypassed by a client using only TLS 1.3, as TLS extensions (SNI, ALPN) were not being inspected. This could result in connections being matched to incorrect filter chains, potentially bypassing security restrictions (Envoy Advisory, NVD).
The vulnerability has been assigned CVE-2020-8660 with a CVSS v3.1 Base Score of 5.3 (MEDIUM). The vulnerability stems from insufficient verification of data authenticity (CWE-345) in the TLS inspection process. When a client uses TLS 1.3, the TLS inspector fails to properly inspect TLS extensions such as SNI and ALPN, leading to potential security bypass (NVD).
The vulnerability could result in connections being matched to incorrect filter chains, potentially bypassing security restrictions. This could lead to unauthorized access or bypass of security controls intended to be enforced by the TLS inspector (Envoy Advisory).
The vulnerability has been fixed in Envoy versions 1.13.1 and 1.12.3. Users are advised to upgrade to these or later versions to address the security issue (Envoy Advisory, Envoy Version History).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."