CVE-2025-66220
- EPSS 0.05%
- Veröffentlicht 03.12.2025 18:31:50
- Zuletzt bearbeitet 05.12.2025 15:44:26
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) insid...
CVE-2025-64763
- EPSS 0.1%
- Veröffentlicht 03.12.2025 18:15:47
- Zuletzt bearbeitet 05.12.2025 16:52:24
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, when Envoy is configured in TCP proxy mode to handle CONNECT requests, it accepts client data before issuing a 2xx response and forwards that dat...
CVE-2025-64527
- EPSS 0.13%
- Veröffentlicht 03.12.2025 18:15:46
- Zuletzt bearbeitet 05.12.2025 16:56:40
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy crashes when JWT authentication is configured with the remote JWKS fetching, allow_missing_or_failed is enabled, multiple JWT tokens are pr...
CVE-2025-62504
- EPSS 0.01%
- Veröffentlicht 16.10.2025 21:23:41
- Zuletzt bearbeitet 29.10.2025 19:19:16
Envoy is an open source edge and service proxy. Envoy versions earlier than 1.36.2, 1.35.6, 1.34.10, and 1.33.12 contain a use-after-free vulnerability in the Lua filter. When a Lua script executing in the response phase rewrites a response body so t...
CVE-2025-62409
- EPSS 0.01%
- Veröffentlicht 16.10.2025 17:47:25
- Zuletzt bearbeitet 29.10.2025 19:55:48
Envoy is a cloud-native, open source edge and service proxy. Prior to 1.36.1, 1.35.5, 1.34.9, and 1.33.10, large requests and responses can potentially trigger TCP connection pool crashes due to flow control management in Envoy. It will happen when t...
CVE-2025-55162
- EPSS 0.01%
- Veröffentlicht 03.09.2025 19:51:51
- Zuletzt bearbeitet 08.09.2025 18:42:05
Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In versions below 1.32.10 and 1.33.0 through 1.33.6, 1.34.0 through 1.34.4 and 1.35.0, insufficient Session Expiration in the Envoy OAuth...
CVE-2025-54588
- EPSS 0.01%
- Veröffentlicht 02.09.2025 23:39:07
- Zuletzt bearbeitet 08.09.2025 15:19:04
Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. Versions 1.34.0 through 1.34.4 and 1.35.0 contain a use-after-free (UAF) vulnerability in the DNS cache, causing abnormal process termina...
CVE-2025-46821
- EPSS 0.01%
- Veröffentlicht 07.05.2025 21:24:07
- Zuletzt bearbeitet 03.09.2025 17:57:13
Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the `*` character from a set of valid characters in the URI path. As a result URI path containi...
CVE-2025-30157
- EPSS 0.01%
- Veröffentlicht 21.03.2025 14:49:18
- Zuletzt bearbeitet 01.04.2025 20:22:34
Envoy is a cloud-native high-performance edge/middle/service proxy. Prior to 1.33.1, 1.32.4, 1.31.6, and 1.30.10, Envoy's ext_proc HTTP filter is at risk of crashing if a local reply is sent to the external server due to the filter's life time issue....
CVE-2024-53271
- EPSS 0.01%
- Veröffentlicht 18.12.2024 20:15:24
- Zuletzt bearbeitet 04.09.2025 14:03:45
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versi...