
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-22946 affects Spring Cloud Gateway versions prior to 3.1.1+. The vulnerability was discovered and reported on March 1, 2022, by Benjamin Bargeton from BNP Paribas. Applications using Spring Cloud Gateway that are configured to enable HTTP2 and no key store or trusted certificates are set will be configured to use an insecure TrustManager (Spring Security, NVD).
The vulnerability has a CVSS v3.1 Base Score of 5.5 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N. The vulnerability is classified as CWE-295 (Improper Certificate Validation). When HTTP2 is enabled without proper key store or trusted certificates configuration, the gateway uses an insecure TrustManager, which compromises the security of connections to remote services (NVD).
The vulnerability makes the gateway able to connect to remote services with invalid or custom certificates, potentially compromising the security of communications between services. This could lead to man-in-the-middle attacks or unauthorized access to sensitive information (Spring Security).
Users of affected versions should upgrade to Spring Cloud Gateway version 3.1.1+ to address this vulnerability. No other steps are necessary after the upgrade. The fix has been implemented in all releases from version 3.1.1 and onwards (Spring Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."