CVE-2020-35470Improper Access Control in Envoy

Severity
8.8HIGHNVD
EPSS
0.8%
top 26.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 15
Latest updateMay 24

Description

Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

NVDenvoyproxy/envoy< 1.16.1

Patches

🔴Vulnerability Details

1
GHSA
GHSA-rpv9-285j-r9jm: Envoy before 12022-05-24

📋Vendor Advisories

1
Red Hat
envoy: logs incorrect downstream address making it possible to bypass the RBAC policy2020-11-21
CVE-2020-35470 — Improper Access Control in Envoy | cvebase