It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-51008 It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 18 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Palantir

Published:

Updated: 2025-03-18T15:04:29.968Z

Reserved: 2023-02-02T00:00:00.000Z

Link: CVE-2022-48308

cve-icon Vulnrichment

Updated: 2024-08-03T15:10:59.729Z

cve-icon NVD

Status : Modified

Published: 2023-02-16T16:15:12.397

Modified: 2024-11-21T07:33:08.070

Link: CVE-2022-48308

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.