Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a user of Istio is impacted if the JWKS resolver becomes unavailable or the fetch fails, exposing hardcoded defaults regardless of use of the RequestAuthentication resource. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.
References
| Link | Resource |
|---|---|
| https://github.com/istio/istio/security/advisories/GHSA-v75c-crr9-733c | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-10 22:16
Updated : 2026-03-18 18:59
NVD link : CVE-2026-31837
Mitre link : CVE-2026-31837
CVE.ORG link : CVE-2026-31837
JSON object : View
Products Affected
istio
- istio
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
