CVE-2022-23606: CWE-674: Uncontrolled Recursion in envoyproxy envoy
Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.
AI Analysis
Technical Summary
CVE-2022-23606 is a medium-severity vulnerability affecting Envoy, an open-source edge and service proxy widely used in cloud-native application architectures. The vulnerability arises from uncontrolled recursion in the process of disconnecting idle connections when a cluster is deleted via the Cluster Discovery Service (CDS). Specifically, when a cluster is removed, Envoy attempts to disconnect all idle connections associated with that cluster's endpoints. Due to a recursive call in the disconnection logic, if the cluster has a large number of idle connections, the recursion depth can grow excessively, leading to stack exhaustion. This results in abnormal process termination or a crash of the Envoy proxy. The affected versions include Envoy releases from 1.20.0 up to but not including 1.20.2, and from 1.21.0 up to but not including 1.21.1. The vulnerability is categorized under CWE-674 (Uncontrolled Recursion), which indicates a failure to properly limit recursion depth, causing resource exhaustion. No known exploits have been reported in the wild, but the impact is a denial of service (DoS) condition due to process crash. Users are advised to upgrade to patched versions beyond 1.20.2 or 1.21.1 to mitigate this issue. Since Envoy is often deployed as a critical component in service meshes, API gateways, and edge proxies, this vulnerability can disrupt service availability if exploited or triggered unintentionally during cluster management operations.
Potential Impact
For European organizations, the primary impact of CVE-2022-23606 is on service availability. Envoy is commonly used in microservices architectures, cloud-native environments, and service mesh implementations, which are prevalent in sectors such as finance, telecommunications, healthcare, and government services across Europe. A crash of Envoy proxies due to this vulnerability could lead to temporary denial of service, disrupting internal and external communications, API traffic, and load balancing functions. This can degrade user experience, interrupt business-critical workflows, and potentially cause cascading failures in dependent systems. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be significant, especially for organizations relying on Envoy for high-availability and low-latency services. Additionally, the need to frequently delete and update clusters in dynamic environments (e.g., auto-scaling or continuous deployment pipelines) increases the risk of triggering this issue. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern for operational stability.
Mitigation Recommendations
To mitigate CVE-2022-23606, European organizations should: 1) Upgrade Envoy to versions 1.20.2 or later, or 1.21.1 or later, where the recursion issue has been fixed. 2) Audit and monitor cluster management operations to minimize unnecessary frequent cluster deletions, especially in environments with large numbers of idle connections. 3) Implement robust health checks and automated restart mechanisms to quickly recover from Envoy crashes, reducing downtime impact. 4) Use connection draining and graceful shutdown procedures to reduce the number of idle connections at cluster removal time. 5) In environments where immediate upgrade is not feasible, consider limiting the number of idle connections per cluster or implementing rate limiting on cluster deletion requests to avoid triggering deep recursion. 6) Continuously monitor Envoy logs and metrics for signs of abnormal process terminations or stack overflow errors. 7) Incorporate this vulnerability into incident response and risk assessment frameworks to prioritize patching and operational controls. These steps go beyond generic advice by focusing on operational practices around cluster lifecycle and connection management specific to Envoy deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Switzerland
CVE-2022-23606: CWE-674: Uncontrolled Recursion in envoyproxy envoy
Description
Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion causes Envoy to crash. Users are advised to upgrade.
AI-Powered Analysis
Technical Analysis
CVE-2022-23606 is a medium-severity vulnerability affecting Envoy, an open-source edge and service proxy widely used in cloud-native application architectures. The vulnerability arises from uncontrolled recursion in the process of disconnecting idle connections when a cluster is deleted via the Cluster Discovery Service (CDS). Specifically, when a cluster is removed, Envoy attempts to disconnect all idle connections associated with that cluster's endpoints. Due to a recursive call in the disconnection logic, if the cluster has a large number of idle connections, the recursion depth can grow excessively, leading to stack exhaustion. This results in abnormal process termination or a crash of the Envoy proxy. The affected versions include Envoy releases from 1.20.0 up to but not including 1.20.2, and from 1.21.0 up to but not including 1.21.1. The vulnerability is categorized under CWE-674 (Uncontrolled Recursion), which indicates a failure to properly limit recursion depth, causing resource exhaustion. No known exploits have been reported in the wild, but the impact is a denial of service (DoS) condition due to process crash. Users are advised to upgrade to patched versions beyond 1.20.2 or 1.21.1 to mitigate this issue. Since Envoy is often deployed as a critical component in service meshes, API gateways, and edge proxies, this vulnerability can disrupt service availability if exploited or triggered unintentionally during cluster management operations.
Potential Impact
For European organizations, the primary impact of CVE-2022-23606 is on service availability. Envoy is commonly used in microservices architectures, cloud-native environments, and service mesh implementations, which are prevalent in sectors such as finance, telecommunications, healthcare, and government services across Europe. A crash of Envoy proxies due to this vulnerability could lead to temporary denial of service, disrupting internal and external communications, API traffic, and load balancing functions. This can degrade user experience, interrupt business-critical workflows, and potentially cause cascading failures in dependent systems. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be significant, especially for organizations relying on Envoy for high-availability and low-latency services. Additionally, the need to frequently delete and update clusters in dynamic environments (e.g., auto-scaling or continuous deployment pipelines) increases the risk of triggering this issue. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern for operational stability.
Mitigation Recommendations
To mitigate CVE-2022-23606, European organizations should: 1) Upgrade Envoy to versions 1.20.2 or later, or 1.21.1 or later, where the recursion issue has been fixed. 2) Audit and monitor cluster management operations to minimize unnecessary frequent cluster deletions, especially in environments with large numbers of idle connections. 3) Implement robust health checks and automated restart mechanisms to quickly recover from Envoy crashes, reducing downtime impact. 4) Use connection draining and graceful shutdown procedures to reduce the number of idle connections at cluster removal time. 5) In environments where immediate upgrade is not feasible, consider limiting the number of idle connections per cluster or implementing rate limiting on cluster deletion requests to avoid triggering deep recursion. 6) Continuously monitor Envoy logs and metrics for signs of abnormal process terminations or stack overflow errors. 7) Incorporate this vulnerability into incident response and risk assessment frameworks to prioritize patching and operational controls. These steps go beyond generic advice by focusing on operational practices around cluster lifecycle and connection management specific to Envoy deployments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2533
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 4:47:28 PM
Last updated: 8/15/2025, 11:00:15 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.