{"uuid": "03382f0a-5e51-418f-8389-3670bdccb60b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31733", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8734", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31733\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is enabled AND unproxied ports are turned off, then an attacker could connect to an application that should be only reachable via mTLS, without presenting a client certificate.\n\ud83d\udccf Published: 2023-02-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T19:11:41.312Z\n\ud83d\udd17 References:\n1. https://www.cloudfoundry.org/blog/cve-2022-31733-unsecured-application-port", "creation_timestamp": "2025-03-25T19:24:47.000000Z"}