7.1
CVE-2024-53271
- EPSS 0%
- Veröffentlicht 18.12.2024 20:15:24
- Zuletzt bearbeitet 04.09.2025 14:03:45
- Quelle security-advisories@github.com
- Teams Watchlist Login
- Unerledigt Login
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Envoyproxy ≫ Envoy Version >= 1.31.0 < 1.31.5
Envoyproxy ≫ Envoy Version >= 1.32.0 <= 1.32.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0% | 0.001 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
security-advisories@github.com | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
|
CWE-670 Always-Incorrect Control Flow Implementation
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.