content/en/news/security/istio-security-2020-009/index.md
{{< security_bulletin >}}
Istio is vulnerable to a newly discovered vulnerability:
CVE-2020-16844:
Callers to TCP services that have a defined Authorization Policies with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields will never be denied access.
Istio users are exposed to this vulnerability in the following ways:
If the user has an Authorization similar to
{{< text yaml >}} apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: foo namespace: foo spec: action: DENY rules:
Istio translates the principal (and source.principal) field to an Envoy level string match
{{< text yaml >}} stringMatch: suffix: spiffe:///ns/ns1/sa/foo {{< /text >}}
which will not match any legitimate caller as it included the spiffe:// string incorrectly. The correct string match should be
{{< text yaml >}} stringMatch: regex: spiffe://.*/ns/ns1/sa/foo {{< /text >}}
Prefix and exact matches in AuthorizationPolicy is unaffected, as are ALLOW actions in them; HTTP is also unaffected.
{{< boilerplate "security-vulnerability" >}}