Lucene search

K
EnvoyproxyEnvoy

42 matches found

CVE
CVE
added 2023/10/10 2:15 p.m.4497 views

CVE-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

7.5CVSS8AI score0.94456EPSS
CVE
CVE
added 2024/02/09 11:15 p.m.210 views

CVE-2024-23322

Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen within the same interval. The crash occurs when the following are true: 1. hedge_on_per_try_timeout is enabled, 2. per_try_idle_timeout is enabled (it can only be done in configuration), 3. per-try-...

7.5CVSS7.3AI score0.0006EPSS
CVE
CVE
added 2023/07/13 9:15 p.m.194 views

CVE-2023-35945

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving RST_STREAM immediately followed by the GOAWAY frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the GOAWAY...

7.5CVSS7.4AI score0.00095EPSS
CVE
CVE
added 2019/11/11 1:15 a.m.177 views

CVE-2019-18836

Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used."

7.5CVSS7.2AI score0.00155EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.145 views

CVE-2021-43826

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions of Envoy a crash occurs when configured for :ref:upstream tunneling and the downstream connection disconnects while the the upstream connection or http/2 stream is still being established. ...

7.5CVSS7.5AI score0.0009EPSS
CVE
CVE
added 2023/04/04 8:15 p.m.144 views

CVE-2023-27496

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a state query param is present on any response that looks like an OAuth redirect response. Sending it a request with the...

7.5CVSS7.6AI score0.00028EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.138 views

CVE-2021-43825

Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data ...

7.5CVSS6.8AI score0.00091EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.138 views

CVE-2022-21655

Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redir...

7.5CVSS7.4AI score0.00116EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.135 views

CVE-2021-43824

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions a crafted request crashes Envoy when a CONNECT request is sent to JWT filter configured with regex match. This provides a denial of service attack vector. The only workaround is to not use r...

7.5CVSS7.2AI score0.00118EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.129 views

CVE-2022-21656

Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Nam...

7.4CVSS6AI score0.00018EPSS
CVE
CVE
added 2023/07/25 7:15 p.m.128 views

CVE-2023-35943

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, the CORS filter will segfault and crash Envoy when the origin header is removed and deleted between decodeHeadersand encodeHeaders. Versions 1.27.0,...

7.5CVSS7.6AI score0.00009EPSS
CVE
CVE
added 2022/06/09 8:15 p.m.109 views

CVE-2022-29225

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 secompressors accumulate decompressed data into an intermediate buffer before overwriting the body in the decode/encodeBody. This may allow an attacker to zip bomb the decompressor by sending a small highly compressed paylo...

7.5CVSS8.3AI score0.00023EPSS
CVE
CVE
added 2020/07/01 3:15 p.m.101 views

CVE-2020-12605

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.

7.5CVSS7.4AI score0.00607EPSS
CVE
CVE
added 2021/05/20 5:15 p.m.99 views

CVE-2021-28682

An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable integer overflow in which a very large grpc-timeout value leads to unexpected timeout calculations.

7.5CVSS7.5AI score0.00086EPSS
CVE
CVE
added 2019/08/19 11:15 p.m.98 views

CVE-2019-15225

In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.

7.5CVSS7.3AI score0.00785EPSS
CVE
CVE
added 2021/05/20 5:15 p.m.98 views

CVE-2021-29258

An issue was discovered in Envoy 1.14.0. There is a remotely exploitable crash for HTTP2 Metadata, because an empty METADATA map triggers a Reachable Assertion.

7.5CVSS7.4AI score0.00116EPSS
CVE
CVE
added 2020/07/01 3:15 p.m.96 views

CVE-2020-12604

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

7.5CVSS7.3AI score0.00435EPSS
CVE
CVE
added 2021/05/20 5:15 p.m.94 views

CVE-2021-28683

An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.

7.5CVSS7.4AI score0.00116EPSS
CVE
CVE
added 2020/07/01 2:15 p.m.92 views

CVE-2020-12603

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (i.e. 1 byte) data frames.

7.5CVSS7.4AI score0.00607EPSS
CVE
CVE
added 2020/07/01 3:15 p.m.91 views

CVE-2020-8663

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may exhaust file descriptors and/or memory when accepting too many connections.

7.5CVSS7.4AI score0.00091EPSS
CVE
CVE
added 2024/09/20 12:15 a.m.91 views

CVE-2024-45810

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling sendLocalReply under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the sendLocalReply() in http async client, one...

7.5CVSS7AI score0.00046EPSS
CVE
CVE
added 2025/03/21 3:15 p.m.91 views

CVE-2025-30157

Envoy is a cloud-native high-performance edge/middle/service proxy. Prior to 1.33.1, 1.32.4, 1.31.6, and 1.30.10, Envoy's ext_proc HTTP filter is at risk of crashing if a local reply is sent to the external server due to the filter's life time issue. A known situation is the failure of a websocket ...

7.5CVSS6.3AI score0.00005EPSS
CVE
CVE
added 2022/06/09 8:15 p.m.84 views

CVE-2022-29228

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t eve...

7.5CVSS8.3AI score0.00171EPSS
CVE
CVE
added 2021/08/24 9:15 p.m.83 views

CVE-2021-32778

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy’s procedure for resetting a HTTP/2 stream has O(N^2) complexity, leading to high CPU utilization when a large number of streams are reset. Deployments are susc...

7.5CVSS6.3AI score0.0007EPSS
CVE
CVE
added 2024/04/04 3:15 p.m.80 views

CVE-2024-27919

Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have been exceeded. This allows an attacker to send an s...

7.5CVSS7.4AI score0.49159EPSS
CVE
CVE
added 2020/12/15 1:15 a.m.78 views

CVE-2020-35471

Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.

7.5CVSS7.5AI score0.00069EPSS
CVE
CVE
added 2024/04/18 3:15 p.m.78 views

CVE-2024-32475

Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with auto_sni enabled, a request containing a host/:authority header longer than 255 characters triggers an abnormal termination of Envoy process. Envoy does not gracefully handle an error when setting...

7.5CVSS6.5AI score0.00057EPSS
CVE
CVE
added 2022/06/09 8:15 p.m.72 views

CVE-2022-29227

Envoy is a cloud-native high-performance edge/middle/service proxy. In versions prior to 1.22.1 if Envoy attempts to send an internal redirect of an HTTP request consisting of more than HTTP headers, there’s a lifetime bug which can be triggered. If while replaying the request Envoy sends a local r...

7.5CVSS8.3AI score0.00134EPSS
CVE
CVE
added 2024/09/20 12:15 a.m.71 views

CVE-2024-45809

Envoy is a cloud-native high-performance edge/middle/service proxy. Jwt filter will lead to an Envoy crash when clear route cache with remote JWKs. In the following case: 1. remote JWKs are used, which requires async header processing; 2. clear_route_cache is enabled on the provider; 3. header oper...

7.5CVSS6.1AI score0.00136EPSS
CVE
CVE
added 2024/02/09 11:15 p.m.69 views

CVE-2024-23327

Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does not have the protoc...

7.5CVSS7.4AI score0.00144EPSS
CVE
CVE
added 2024/12/18 8:15 p.m.69 views

CVE-2024-53270

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions sendOverloadError is going to assume the active request exists when envoy.load_shed_points.http1_server_abort_dispatch is configured. If active_request is nullptr, only onMessageBeginImpl() is called. However, ...

7.5CVSS7.4AI score0.00226EPSS
CVE
CVE
added 2019/10/09 4:15 p.m.64 views

CVE-2019-15226

Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and all versions of Envoy for HTTP/2 traffic had O(n...

7.8CVSS7.7AI score0.13102EPSS
CVE
CVE
added 2019/12/13 1:15 p.m.53 views

CVE-2019-18838

An issue was discovered in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filter chain before being sent to the client. An enco...

7.5CVSS8.3AI score0.00099EPSS
CVE
CVE
added 2024/02/09 11:15 p.m.52 views

CVE-2024-23325

Envoy is a high-performance edge/middle/service proxy. Envoy crashes in Proxy protocol when using an address type that isn’t supported by the OS. Envoy is susceptible to crashing on a host with IPv6 disabled and a listener config with proxy protocol enabled when it receives a request where the clie...

7.5CVSS7.3AI score0.00042EPSS
CVE
CVE
added 2020/10/01 5:15 p.m.51 views

CVE-2020-25018

Envoy master between 2d69e30 and 3b5acb2 may fail to parse request URL that requires host canonicalization.

7.5CVSS7.5AI score0.02911EPSS
CVE
CVE
added 2021/09/09 10:15 p.m.45 views

CVE-2021-39204

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions...

7.5CVSS7.3AI score0.00407EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.40 views

CVE-2024-32976

Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input.

7.5CVSS7.6AI score0.0001EPSS
CVE
CVE
added 2024/12/18 8:15 p.m.40 views

CVE-2024-53271

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrad...

7.1CVSS6.9AI score0.00072EPSS
CVE
CVE
added 2024/09/20 12:15 a.m.37 views

CVE-2024-45807

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using oghttp as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the oghttp2 by default. The impact of this issue is that envoy will...

7.5CVSS7.5AI score0.0002EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.31 views

CVE-2024-34363

Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash.

7.5CVSS7.6AI score0.0001EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.29 views

CVE-2024-32974

Envoy is a cloud-native, open source edge and service proxy. A crash was observed in EnvoyQuicServerStream::OnInitialHeadersComplete() with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after StopReading() being called on the stream. As after StopRead...

7.5CVSS6.6AI score0.00015EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.23 views

CVE-2024-32975

Envoy is a cloud-native, open source edge and service proxy. There is a crash at QuicheDataReader::PeekVarInt62Length(). It is caused by integer underflow in the QuicStreamSequencerBuffer::PeekRegion() implementation.

7.5CVSS6.5AI score0.00023EPSS