Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-w45j-f832-hxvh: Client Certificates are accepted without CertificateVerify

Impact

A DTLS Client could provide a Certificate that it doesn’t posses the private key for and Pion DTLS wouldn’t reject it.

This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can’t be trusted when using a Pion DTLS server prior to v2.1.5

Patches

Upgrade to Pion DTLS v2.1.5

Workarounds

No workarounds available, upgrade to Pion DTLS v2.1.5

References

Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.

For more information

If you have any questions or comments about this advisory:

ghsa
#git#ssl

Client Certificates are accepted without CertificateVerify

Moderate severity GitHub Reviewed Published May 25, 2022 in pion/dtls • Updated May 25, 2022

Package

gomod github.com/pion/dtls (Go )

Affected versions

< 2.1.5

Patched versions

2.1.5

Description

Impact

A DTLS Client could provide a Certificate that it doesn’t posses the private key for and Pion DTLS wouldn’t reject it.

This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can’t be trusted when using a Pion DTLS server prior to v2.1.5

Patches

Upgrade to Pion DTLS v2.1.5

Workarounds

No workarounds available, upgrade to Pion DTLS v2.1.5

References

Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.

For more information

If you have any questions or comments about this advisory:

References

  • GHSA-w45j-f832-hxvh
  • https://nvd.nist.gov/vuln/detail/CVE-2022-29222
  • pion/dtls@d2f7971
  • https://github.com/pion/dtls/releases/tag/v2.1.5

Sean-Der published the maintainer security advisory

May 16, 2022

Severity

Moderate

5.9

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

High

Privileges required

None

User interaction

None

Scope

Unchanged

Confidentiality

None

Integrity

High

Availability

None

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CWE-295

CVE ID

CVE-2022-29222

GHSA ID

GHSA-w45j-f832-hxvh

Source code

github.com/pion/dtls

Improvements are not currently accepted on this advisory because it uses an unsupported versioning operator. Read more and discuss here.

Related news

CVE-2022-29222: Release v2.1.5 · pion/dtls

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to version 2.1.5. Users should upgrade to version 2.1.5 to receive a patch. There are currently no known workarounds.