The kube-rbac-proxy container before version 0.4.1 as used in Red Hat OpenShift Container Platform does not honor TLS configurations, allowing for use of insecure ciphers and TLS 1.0. An attacker could target traffic sent over a TLS connection with a weak configuration and potentially break the encryption.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106744 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHBA-2019:0327 | Vendor Advisory |
https://access.redhat.com/security/cve/CVE-2019-3818 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3818 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-02-05 17:29
Updated : 2021-05-21 14:42
NVD link : CVE-2019-3818
Mitre link : CVE-2019-3818
CVE.ORG link : CVE-2019-3818
JSON object : View
Products Affected
redhat
- openshift_container_platform
kube-rbac-proxy_project
- kube-rbac-proxy
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm