Description
An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0408 | An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate. |
Github GHSA |
GHSA-qrqr-3x5j-2xw9 | Docker Authentication Bypass |
References
History
Thu, 08 Aug 2024 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat service Mesh |
|
| CPEs | cpe:/a:redhat:service_mesh:2.6::el8 cpe:/a:redhat:service_mesh:2.6::el9 |
|
| Vendors & Products |
Redhat
Redhat service Mesh |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:38:06.338Z
Reserved: 2018-06-21T00:00:00.000Z
Link: CVE-2018-12608
No data.
Status : Modified
Published: 2018-09-10T17:29:00.287
Modified: 2024-11-21T03:45:32.067
Link: CVE-2018-12608
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA