7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.0005 Low
EPSS
Percentile
17.1%
github.com/envoyproxy/envoy is vulnerable to a use-after-free. The vulnerability is due to QUICHE
continuing to push request headers after the StopReading
method is called on the stream, which can lead to accessing a destroyed HCM ActiveStream
object. This allows attackers to disrupt service by manipulating the freed memory.