Vulnerability Details : CVE-2022-27890
It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of AtlasDB, the vulnerability was mitigated by other network controls such as two-way TLS when deployed as part of a Palantir platform. Palantir still recommends upgrading to a non-vulnerable version out of an abundance of caution.
Products affected by CVE-2022-27890
- cpe:2.3:a:palantir:atlasdb:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-27890
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-27890
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N |
2.1
|
4.2
|
Palantir Technologies | |
7.4
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
NIST |
CWE ids for CVE-2022-27890
-
The product does not validate, or incorrectly validates, a certificate.Assigned by: nvd@nist.gov (Primary)
-
The product communicates with a host that provides a certificate, but the product does not properly ensure that the certificate is actually associated with that host.Assigned by: cve-coordination@palantir.com (Secondary)
References for CVE-2022-27890
-
https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-15.md
security-bulletins/PLTRSEC-2022-15.md at main · palantir/security-bulletins · GitHubVendor Advisory
Jump to