CVE-2025-54588Use After Free in Envoyproxy Envoy

CWE-416Use After Free4 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.0%
top 99.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 3
Latest updateSep 15

Description

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. Versions 1.34.0 through 1.34.4 and 1.35.0 contain a use-after-free (UAF) vulnerability in the DNS cache, causing abnormal process termination. The vulnerability is in Envoy's Dynamic Forward Proxy implementation, occurring when a completion callback for a DNS resolution triggers new DNS resolutions or removes existing pending resolutions. This condition may occur when the following co

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDenvoyproxy/envoy1.34.01.34.5+1
Gogithub.com/envoyproxy_envoy1.35.01.35.1+1
CVEListV5envoyproxy/envoy>= 1.34.0, < 1.34.5, >= 1.35.0, < 1.35.1+1

Patches

🔴Vulnerability Details

2
GHSA
Envoy: Race condition in Dynamic Forward Proxy leads to use-after-free and segmentation faults2025-09-15
OSV
Envoy: Race condition in Dynamic Forward Proxy leads to use-after-free and segmentation faults2025-09-15

📋Vendor Advisories

1
Red Hat
envoyproxy/envoy: Use after free in DNS cache2025-09-03