CVE-2022-29222 – github.com/pion/dtls/v2
Package
Manager: go
Name: github.com/pion/dtls/v2
Vulnerable Version: >=0 <2.1.5
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00344 pctl0.56286
Details
Pion/DLTS Accepts Client Certificates Without CertificateVerify ### Impact A DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to v2.1.5 ### Patches Upgrade to Pion DTLS v2.1.5 ### Workarounds No workarounds available, upgrade to Pion DTLS v2.1.5 ### References Thank you to [Juho Nurminen](https://github.com/jupenur) and the Mattermost team for discovering and reporting this. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Pion DTLS](http://github.com/pion/dtls) * Email us at [team@pion.ly](mailto:team@pion.ly)
Metadata
Created: 2022-05-25T19:26:09Z
Modified: 2023-08-29T23:28:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w45j-f832-hxvh/GHSA-w45j-f832-hxvh.json
CWE IDs: ["CWE-295"]
Alternative ID: GHSA-w45j-f832-hxvh
Finding: F163
Auto approve: 1