Envoyproxy Envoy vulnerabilities
95 known vulnerabilities affecting envoyproxy/envoy.
Total CVEs
95
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL11HIGH63MEDIUM20LOW1
Vulnerabilities
Page 2 of 5
CVE-2024-45808MEDIUMCVSS 6.5fixed in 1.28.7≥ 1.29.0, < 1.29.9+5 more2024-09-20
CVE-2024-45808 [MEDIUM] CWE-117 CVE-2024-45808: Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identif
Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.
nvd
CVE-2024-45806MEDIUMCVSS 6.5fixed in 1.28.7≥ 1.29.0, < 1.29.9+5 more2024-09-20
CVE-2024-45806 [MEDIUM] CWE-639 CVE-2024-45806: Envoy is a cloud-native high-performance edge/middle/service proxy. A security vulnerability in Envo
Envoy is a cloud-native high-performance edge/middle/service proxy. A security vulnerability in Envoy allows external clients to manipulate Envoy headers, potentially leading to unauthorized access or other malicious actions within the mesh. This issue arises due to Envoy's default configuration of internal trust boundaries, which considers all RFC1
nvd
CVE-2024-39305CRITICALCVSS 9.1v1.27.6v1.28.4+6 more2024-07-01
CVE-2024-39305 [CRITICAL] CWE-416 CVE-2024-39305: Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.
Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured. Memory alloca
nvd
CVE-2024-32976HIGHCVSS 7.5≥ 1.18.0, < 1.27.6≥ 1.28.0, < 1.28.4+6 more2024-06-04
CVE-2024-32976 [HIGH] CWE-835 CVE-2024-32976: Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get
Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input.
nvd
CVE-2024-32975HIGHCVSS 7.5fixed in 1.27.6≥ 1.28.0, < 1.28.4+6 more2024-06-04
CVE-2024-32975 [HIGH] CWE-191 CVE-2024-32975: Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::
Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::PeekVarInt62Length()`. It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation.
nvd
CVE-2024-23326HIGHCVSS 8.2fixed in 1.27.6≥ 1.28.0, < 1.28.4+6 more2024-06-04
CVE-2024-23326 [HIGH] CWE-391 CVE-2024-23326: Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnera
Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101 when switching protocols. Envoy incorrectly accepts a 200 response from a
nvd
CVE-2024-32974HIGHCVSS 7.5fixed in 1.27.6≥ 1.28.0, < 1.28.4+6 more2024-06-04
CVE-2024-32974 [HIGH] CWE-416 CVE-2024-32974: Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServe
Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopReading()` being called on the stream. As after `StopReading()`, the HCM's `ActiveStream` might have alrea
nvd
CVE-2024-34363HIGHCVSS 7.5≥ 1.28.0, < 1.28.4≥ 1.29.0, < 1.29.5+4 more2024-06-04
CVE-2024-34363 [HIGH] CWE-248 CVE-2024-34363: Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann J
Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash.
nvd
CVE-2024-34362MEDIUMCVSS 5.9fixed in 1.27.6≥ 1.28.0, < 1.28.4+6 more2024-06-04
CVE-2024-34362 [MEDIUM] CWE-416 CVE-2024-34362: Envoy is a cloud-native, open source edge and service proxy. There is a use-after-free in `HttpConne
Envoy is a cloud-native, open source edge and service proxy. There is a use-after-free in `HttpConnectionManager` (HCM) with `EnvoyQuicServerStream` that can crash Envoy. An attacker can exploit this vulnerability by sending a request without `FIN`, then a `RESET_STREAM` frame, and then after receiving the response, closing the connection.
nvd
CVE-2024-34364MEDIUMCVSS 6.5fixed in 1.27.6≥ 1.28.0, < 1.28.4+6 more2024-06-04
CVE-2024-34364 [MEDIUM] CWE-400 CVE-2024-34364: Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) ve
Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer.
nvd
CVE-2024-32475HIGHCVSS 7.5≥ 1.13.0, < 1.27.5≥ 1.28.0, < 1.28.3+6 more2024-04-18
CVE-2024-32475 [HIGH] CWE-253 CVE-2024-32475: Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used wi
Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process. Envoy does not gracefully handle an error when setting SNI for outbound TLS connection. The error can
nvd
CVE-2024-27919HIGHCVSS 7.5v1.29.0v1.29.1+1 more2024-04-04
CVE-2024-27919 [HIGH] CWE-390 CVE-2024-27919: Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy
Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have been exceeded. This allows an attacker to send an sequence of CONTINUATION frames without the END_HEADERS
nvd
CVE-2024-30255HIGHCVSS 7.5fixed in 1.26.8≥ 1.27.0, < 1.27.4+5 more2024-04-04
CVE-2024-30255 [HIGH] CWE-390 CVE-2024-30255: Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy vers
Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited number of CONTINUATION frames even after exceeding Envoy's header map limi
nvd
CVE-2024-23324HIGHCVSS 7.5≥ 1.26.0, < 1.26.7≥ 1.27.0, < 1.27.3+6 more2024-02-09
CVE-2024-23324 [HIGH] CWE-20 CVE-2024-23324: Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by do
Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users a
nvd
CVE-2024-23325HIGHCVSS 7.5≥ 1.26.0, < 1.26.7≥ 1.27.0, < 1.27.3+6 more2024-02-09
CVE-2024-23325 [HIGH] CWE-248 CVE-2024-23325: Envoy is a high-performance edge/middle/service proxy. Envoy crashes in Proxy protocol when using an
Envoy is a high-performance edge/middle/service proxy. Envoy crashes in Proxy protocol when using an address type that isn’t supported by the OS. Envoy is susceptible to crashing on a host with IPv6 disabled and a listener config with proxy protocol enabled when it receives a request where the client presents its IPv6 address. It is valid for a client
nvd
CVE-2024-23327HIGHCVSS 7.5≥ 1.26.0, < 1.26.7≥ 1.27.0, < 1.27.3+6 more2024-02-09
CVE-2024-23327 [HIGH] CWE-476 CVE-2024-23327: Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and s
Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does not have the protocol block. This issue has been addressed in releases 1.
nvd
CVE-2024-23322HIGHCVSS 7.5≥ 1.26.0, < 1.26.7≥ 1.27.0, < 1.27.3+6 more2024-02-09
CVE-2024-23322 [HIGH] CWE-416 CVE-2024-23322: Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen
Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen within the same interval. The crash occurs when the following are true: 1. hedge_on_per_try_timeout is enabled, 2. per_try_idle_timeout is enabled (it can only be done in configuration), 3. per-try-timeout is enabled, either through headers or configur
nvd
CVE-2024-23323MEDIUMCVSS 5.3≥ 1.26.0, < 1.26.7≥ 1.27.0, < 1.27.3+6 more2024-02-09
CVE-2024-23323 [MEDIUM] CWE-400 CVE-2024-23323: Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every re
Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known
nvd
CVE-2023-44487HIGHCVSS 7.5KEVPoCv1.24.10v1.25.9+2 more2023-10-10
CVE-2023-44487 [HIGH] CWE-400 CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancell
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
nvd
CVE-2023-35941CRITICALCVSS 9.8≥ 1.23.0, < 1.23.12≥ 1.24.0, < 1.24.10+6 more2023-07-25
CVE-2023-35941 [CRITICAL] CWE-116 CVE-2023-35941: Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to vers
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2
nvd