7.1
CVE-2025-66220
- EPSS 0%
- Veröffentlicht 03.12.2025 18:31:50
- Zuletzt bearbeitet 05.12.2025 15:44:26
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Envoyproxy ≫ Envoy Version < 1.33.13
Envoyproxy ≫ Envoy Version >= 1.34.0 < 1.34.11
Envoyproxy ≫ Envoy Version >= 1.35.0 < 1.35.7
Envoyproxy ≫ Envoy Version >= 1.36.0 < 1.36.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0% | 0.001 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
|
| security-advisories@github.com | 5 | 0.7 | 4.2 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N
|
CWE-170 Improper Null Termination
The product does not terminate or incorrectly terminates a string or array with a null character or equivalent terminator.