Vulnerability Description
An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable integer overflow in which a very large grpc-timeout value leads to unexpected timeout calculations.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Envoyproxy | Envoy | 1.14.6 |
Related Weaknesses (CWE)
References
- https://blog.envoyproxy.ioVendor Advisory
- https://github.com/envoyproxy/envoy/blob/15e3b9dbcc9aaa9d391fa8033904aad1ea1ae70ExploitThird Party Advisory
- https://github.com/envoyproxy/envoy/releasesThird Party Advisory
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-r22g-5f3x-xjggThird Party Advisory
- https://blog.envoyproxy.ioVendor Advisory
- https://github.com/envoyproxy/envoy/blob/15e3b9dbcc9aaa9d391fa8033904aad1ea1ae70ExploitThird Party Advisory
- https://github.com/envoyproxy/envoy/releasesThird Party Advisory
FAQ
What is CVE-2021-28682?
CVE-2021-28682 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable integer overflow in which a very large grpc-timeout value leads to unexpected timeout calculations.
How severe is CVE-2021-28682?
CVE-2021-28682 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-28682?
Check the references section above for vendor advisories and patch information. Affected products include: Envoyproxy Envoy.