Skip to main content

CVE-2022-29224: CWE-476: NULL Pointer Dereference in envoyproxy envoy

Medium
Published: Thu Jun 09 2022 (06/09/2022, 19:10:10 UTC)
Source: CVE
Vendor/Project: envoyproxy
Product: envoy

Description

Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can “hold” (prevent removal) upstream hosts obtained via service discovery until configured active health checking fails. If an attacker controls an upstream host and also controls service discovery of that host (via DNS, the EDS API, etc.), an attacker can crash Envoy by forcing removal of the host from service discovery, and then failing the gRPC health check request. This will crash Envoy via a null pointer dereference. Users are advised to upgrade to resolve this vulnerability. Users unable to upgrade may disable gRPC health checking and/or replace it with a different health checking type as a mitigation.

AI-Powered Analysis

AILast updated: 06/23/2025, 06:22:05 UTC

Technical Analysis

CVE-2022-29224 is a medium-severity vulnerability affecting versions of Envoy proxy prior to 1.22.1. Envoy is a widely used cloud-native high-performance proxy that supports various upstream health checking mechanisms, including gRPC-based health checks. The vulnerability arises from a NULL pointer dereference in the GrpcHealthCheckerImpl component. Specifically, Envoy has a feature that allows it to “hold” upstream hosts obtained via service discovery, preventing their removal until active health checks fail. An attacker who controls an upstream host and the associated service discovery mechanism (such as DNS or Endpoint Discovery Service API) can exploit this by forcing the removal of the host from service discovery and then causing the gRPC health check to fail. This sequence triggers a null pointer dereference, resulting in a segmentation fault that crashes the Envoy process. The crash leads to a denial of service (DoS) condition for the proxy, potentially disrupting traffic routing and service availability. The vulnerability does not require authentication but does require the attacker to control upstream hosts and service discovery data, which may limit exploitation scope. No known exploits are reported in the wild, and the vendor recommends upgrading to version 1.22.1 or later to remediate the issue. For users unable to upgrade promptly, disabling gRPC health checking or switching to alternative health check types can mitigate the risk.

Potential Impact

The primary impact of this vulnerability is denial of service due to Envoy process crashes. For European organizations relying on Envoy as a critical component in their cloud-native infrastructure, microservices architecture, or service mesh deployments, exploitation could disrupt service availability and degrade operational continuity. This is particularly significant for sectors with high availability requirements such as finance, telecommunications, healthcare, and government services. The crash could interrupt traffic routing, load balancing, and health monitoring, potentially causing cascading failures in dependent services. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact can indirectly affect business operations and service-level agreements (SLAs). Given that exploitation requires control over upstream hosts and service discovery, the threat is more relevant in environments where service discovery is externally influenced or less tightly controlled. The absence of known exploits suggests limited active threat but does not preclude targeted attacks, especially in high-value environments.

Mitigation Recommendations

1. Upgrade Envoy to version 1.22.1 or later, which contains the fix for this vulnerability. 2. If immediate upgrade is not feasible, disable gRPC health checking in Envoy configurations and replace it with alternative health check mechanisms such as HTTP or TCP health checks. 3. Harden service discovery mechanisms to prevent unauthorized manipulation of upstream host information, including securing DNS and EDS APIs with strict access controls and authentication. 4. Implement monitoring and alerting for Envoy crashes or abnormal health check failures to detect potential exploitation attempts early. 5. Conduct regular audits of upstream host configurations and service discovery data to ensure integrity and prevent malicious modifications. 6. Employ network segmentation and zero-trust principles to limit attacker ability to control upstream hosts or service discovery components. 7. Test failover and recovery procedures to minimize downtime in case of Envoy crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-04-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf32cb

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 6:22:05 AM

Last updated: 8/4/2025, 6:48:32 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats