EdgeX Foundry is an open source project for building a common open framework for Internet of Things edge computing. Prior to version 2.1.1, the /api/v2/config endpoint exposes message bus credentials to local unauthenticated users. In security-enabled mode, message bus credentials are supposed to be kept in the EdgeX secret store and require authentication to access. This vulnerability bypasses the access controls on message bus credentials when running in security-enabled mode. (No credentials are required when running in security-disabled mode.) As a result, attackers could intercept data or inject fake data into the EdgeX message bus. Users should upgrade to EdgeXFoundry Kamakura release (2.2.0) or to the June 2022 EdgeXFoundry LTS Jakarta release (2.1.1) to receive a patch. More information about which go modules, docker containers, and snaps contain patches is available in the GitHub Security Advisory. There are currently no known workarounds for this issue.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-06-14T21:55:11.000Z
Updated: 2025-04-23T18:15:12.447Z
Reserved: 2022-05-18T00:00:00.000Z
Link: CVE-2022-31066
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-03T07:03:40.303Z
 NVD
                        NVD
                    Status : Modified
Published: 2022-06-14T22:15:10.380
Modified: 2024-11-21T07:03:49.483
Link: CVE-2022-31066
 Redhat
                        Redhat
                    No data.