7.1
CVE-2025-66220
- EPSS 0%
- Veröffentlicht 03.12.2025 18:31:50
- Zuletzt bearbeitet 05.12.2025 15:44:26
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Envoy’s TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Envoyproxy ≫ Envoy Version < 1.33.13
Envoyproxy ≫ Envoy Version >= 1.34.0 < 1.34.11
Envoyproxy ≫ Envoy Version >= 1.35.0 < 1.35.7
Envoyproxy ≫ Envoy Version >= 1.36.0 < 1.36.3
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0% | 0 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
|
| security-advisories@github.com | 5 | 0.7 | 4.2 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N
|
CWE-170 Improper Null Termination
The product does not terminate or incorrectly terminates a string or array with a null character or equivalent terminator.