Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-23322
HistoryFeb 09, 2024 - 10:51 p.m.

CVE-2024-23322 Envoy crashes when idle and request per try timeout occur within the backoff interval

2024-02-0922:51:53
CWE-416
GitHub_M
github.com
2
cve-2024-23322; envoy proxy; timeout vulnerability; software upgrade; configuration issue; security advisory; no workaround

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Envoy is a high-performance edge/middle/service proxy. Envoy will crash when certain timeouts happen within the same interval. The crash occurs when the following are true: 1. hedge_on_per_try_timeout is enabled, 2. per_try_idle_timeout is enabled (it can only be done in configuration), 3. per-try-timeout is enabled, either through headers or configuration and its value is equal, or within the backoff interval of the per_try_idle_timeout. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "status": "affected",
        "version": ">= 1.29.0, < 1.29.1"
      },
      {
        "status": "affected",
        "version": ">= 1.28.0, < 1.28.1"
      },
      {
        "status": "affected",
        "version": ">= 1.27.0, < 1.27.3"
      },
      {
        "status": "affected",
        "version": "< 1.26.7"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-23322