Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-43826
HistoryFeb 22, 2022 - 10:45 p.m.

CVE-2021-43826 Crash when tunneling TCP over HTTP in Envoy

2022-02-2222:45:22
CWE-416
GitHub_M
www.cve.org
8
envoy
tcp tunneling
crash
upgrade
security issue

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

40.1%

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions of Envoy a crash occurs when configured for :ref:upstream tunneling <envoy_v3_api_field_extensions.filters.network.tcp_proxy.v3.TcpProxy.tunneling_config> and the downstream connection disconnects while the the upstream connection or http/2 stream is still being established. There are no workarounds for this issue. Users are advised to upgrade.

CNA Affected

[
  {
    "product": "envoy",
    "vendor": "envoyproxy",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.18.6"
      },
      {
        "status": "affected",
        "version": ">= 1.19.0, < 1.19.3"
      },
      {
        "status": "affected",
        "version": ">= 1.20.0, < 1.20.2"
      },
      {
        "status": "affected",
        "version": ">= 1.21.0, < 1.21.1"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

40.1%