GHSA-7xg2-83f8-39mr:
The DES/3DES cipher was used as part of the TLS protocol by installation tools
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
1/3/2024
Updated
1/3/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/karmada-io/karmada | go | < 1.8.0 | 1.8.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the use of Golang's default TLS configuration, which includes insecure 3DES ciphers, in several Karmada components. However, the provided data shows the issue was addressed by adding --tls-min-version=VersionTLS13
flags to deployment manifests and Helm/operator templates, rather than modifying specific code functions. The vulnerability arises from configuration defaults, not from identifiable functions in the codebase. The patches adjust command-line arguments for components like karmada-apiserver
, but no functions in the Go code (e.g., TLS configuration logic) are explicitly shown to be vulnerable in the provided diffs. Thus, no specific functions in the code can be pinpointed with high confidence.