CVE-2024-23323

Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

15 Feb 2024, 04:48

Type Values Removed Values Added
CPE cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : 5.3
References () https://github.com/envoyproxy/envoy/commit/71eeee8f0f0132f39e402b0ee23b361ee2f4e645 - () https://github.com/envoyproxy/envoy/commit/71eeee8f0f0132f39e402b0ee23b361ee2f4e645 - Patch, Vendor Advisory
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-x278-4w4x-r7ch - () https://github.com/envoyproxy/envoy/security/advisories/GHSA-x278-4w4x-r7ch - Vendor Advisory
First Time Envoyproxy
Envoyproxy envoy
Summary
  • (es) Envoy es un proxy de servicio/intermedio/perimetral de alto rendimiento. La expresión regular se compila para cada solicitud y puede provocar un uso elevado de la CPU y una mayor latencia de la solicitud cuando se configuran varias rutas con dichos comparadores. Este problema se solucionó en las versiones 1.29.1, 1.28.1, 1.27.3 y 1.26.7. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

09 Feb 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 23:15

Updated : 2024-02-15 04:48


NVD link : CVE-2024-23323

Mitre link : CVE-2024-23323

CVE.ORG link : CVE-2024-23323


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1176

Inefficient CPU Computation