Lucene search

K
redhatcveRedhat.comRH:CVE-2024-23323
HistoryFeb 14, 2024 - 9:34 p.m.

CVE-2024-23323

2024-02-1421:34:09
redhat.com
access.redhat.com
110
envoy proxy
vulnerability
high cpu
increased latency
regex

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

7.2

Confidence

Low

EPSS

0.001

Percentile

17.0%

A flaw was found in the Envoy proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers.

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

7.2

Confidence

Low

EPSS

0.001

Percentile

17.0%