Vulnerability Description
Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Envoyproxy | Envoy | < 1.18.6 |
Related Weaknesses (CWE)
References
- https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350PatchThird Party Advisory
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpgIssue TrackingThird Party Advisory
- https://github.com/envoyproxy/envoy/commit/177d608155ba8b11598b9bbf8240e90d8c350PatchThird Party Advisory
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpgIssue TrackingThird Party Advisory
FAQ
What is CVE-2022-21655?
CVE-2022-21655 is a vulnerability with a CVSS score of 7.5 (HIGH). Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or...
How severe is CVE-2022-21655?
CVE-2022-21655 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-21655?
Check the references section above for vendor advisories and patch information. Affected products include: Envoyproxy Envoy.