logo

CVE-2022-29222 github.com/pion/dtls/v2

Package

Manager: go
Name: github.com/pion/dtls/v2
Vulnerable Version: >=0 <2.1.5

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00344 pctl0.56286

Details

Pion/DLTS Accepts Client Certificates Without CertificateVerify ### Impact A DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to v2.1.5 ### Patches Upgrade to Pion DTLS v2.1.5 ### Workarounds No workarounds available, upgrade to Pion DTLS v2.1.5 ### References Thank you to [Juho Nurminen](https://github.com/jupenur) and the Mattermost team for discovering and reporting this. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Pion DTLS](http://github.com/pion/dtls) * Email us at [team@pion.ly](mailto:team@pion.ly)

Metadata

Created: 2022-05-25T19:26:09Z
Modified: 2023-08-29T23:28:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w45j-f832-hxvh/GHSA-w45j-f832-hxvh.json
CWE IDs: ["CWE-295"]
Alternative ID: GHSA-w45j-f832-hxvh
Finding: F163
Auto approve: 1