CVE-2022-29227: CWE-416: Use After Free in envoyproxy envoy
Envoy is a cloud-native high-performance edge/middle/service proxy. In versions prior to 1.22.1 if Envoy attempts to send an internal redirect of an HTTP request consisting of more than HTTP headers, there’s a lifetime bug which can be triggered. If while replaying the request Envoy sends a local reply when the redirect headers are processed, the downstream state indicates that the downstream stream is not complete. On sending the local reply, Envoy will attempt to reset the upstream stream, but as it is actually complete, and deleted, this result in a use-after-free. Users are advised to upgrade. Users unable to upgrade are advised to disable internal redirects if crashes are observed.
AI Analysis
Technical Summary
CVE-2022-29227 is a use-after-free vulnerability (CWE-416) affecting Envoy proxy versions prior to 1.22.1. Envoy is a widely used cloud-native high-performance edge, middle, and service proxy that handles HTTP traffic routing and management. The vulnerability arises when Envoy attempts to send an internal redirect for an HTTP request containing more than just HTTP headers. Specifically, during the replay of such a request, if Envoy sends a local reply while processing the redirect headers, the downstream state incorrectly indicates that the downstream stream is incomplete. Consequently, when Envoy attempts to reset the upstream stream, it mistakenly operates on a stream that is already complete and deleted, leading to a use-after-free condition. This memory corruption flaw can cause crashes or potentially enable remote code execution or denial of service if exploited. No known public exploits have been reported in the wild to date. The recommended remediation is to upgrade Envoy to version 1.22.1 or later, where this issue is fixed. For users unable to upgrade immediately, disabling internal redirects can mitigate crash occurrences related to this vulnerability.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent to which Envoy proxy is deployed within their infrastructure. Envoy is commonly used in cloud-native environments, microservices architectures, and service mesh implementations, which are prevalent in sectors such as finance, telecommunications, and critical infrastructure. Exploitation could lead to service disruptions due to crashes or potentially allow attackers to execute arbitrary code or escalate privileges within the proxy environment, compromising confidentiality, integrity, and availability of network traffic. This could result in data breaches, interception or manipulation of sensitive communications, and operational downtime. Given Envoy’s role as a traffic proxy, successful exploitation could also facilitate lateral movement within networks. Although no active exploits are known, the vulnerability’s presence in widely deployed proxy infrastructure poses a significant risk if left unpatched.
Mitigation Recommendations
1. Immediate upgrade of Envoy proxy instances to version 1.22.1 or later is the primary and most effective mitigation. 2. For environments where upgrading is not immediately feasible, disable internal redirects in Envoy configurations to prevent triggering the use-after-free condition. 3. Conduct thorough inventory and auditing of all Envoy deployments across the organization to identify affected versions. 4. Implement enhanced monitoring and logging around Envoy proxy processes to detect abnormal crashes or suspicious behavior indicative of exploitation attempts. 5. Employ network segmentation and strict access controls to limit exposure of Envoy instances to untrusted networks or users. 6. Integrate vulnerability scanning and patch management workflows specifically targeting cloud-native infrastructure components like Envoy. 7. Engage with cloud service providers or managed service vendors to ensure their Envoy components are updated and secured. These steps go beyond generic advice by focusing on configuration changes, operational monitoring, and supply chain considerations specific to Envoy deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Italy, Spain
CVE-2022-29227: CWE-416: Use After Free in envoyproxy envoy
Description
Envoy is a cloud-native high-performance edge/middle/service proxy. In versions prior to 1.22.1 if Envoy attempts to send an internal redirect of an HTTP request consisting of more than HTTP headers, there’s a lifetime bug which can be triggered. If while replaying the request Envoy sends a local reply when the redirect headers are processed, the downstream state indicates that the downstream stream is not complete. On sending the local reply, Envoy will attempt to reset the upstream stream, but as it is actually complete, and deleted, this result in a use-after-free. Users are advised to upgrade. Users unable to upgrade are advised to disable internal redirects if crashes are observed.
AI-Powered Analysis
Technical Analysis
CVE-2022-29227 is a use-after-free vulnerability (CWE-416) affecting Envoy proxy versions prior to 1.22.1. Envoy is a widely used cloud-native high-performance edge, middle, and service proxy that handles HTTP traffic routing and management. The vulnerability arises when Envoy attempts to send an internal redirect for an HTTP request containing more than just HTTP headers. Specifically, during the replay of such a request, if Envoy sends a local reply while processing the redirect headers, the downstream state incorrectly indicates that the downstream stream is incomplete. Consequently, when Envoy attempts to reset the upstream stream, it mistakenly operates on a stream that is already complete and deleted, leading to a use-after-free condition. This memory corruption flaw can cause crashes or potentially enable remote code execution or denial of service if exploited. No known public exploits have been reported in the wild to date. The recommended remediation is to upgrade Envoy to version 1.22.1 or later, where this issue is fixed. For users unable to upgrade immediately, disabling internal redirects can mitigate crash occurrences related to this vulnerability.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent to which Envoy proxy is deployed within their infrastructure. Envoy is commonly used in cloud-native environments, microservices architectures, and service mesh implementations, which are prevalent in sectors such as finance, telecommunications, and critical infrastructure. Exploitation could lead to service disruptions due to crashes or potentially allow attackers to execute arbitrary code or escalate privileges within the proxy environment, compromising confidentiality, integrity, and availability of network traffic. This could result in data breaches, interception or manipulation of sensitive communications, and operational downtime. Given Envoy’s role as a traffic proxy, successful exploitation could also facilitate lateral movement within networks. Although no active exploits are known, the vulnerability’s presence in widely deployed proxy infrastructure poses a significant risk if left unpatched.
Mitigation Recommendations
1. Immediate upgrade of Envoy proxy instances to version 1.22.1 or later is the primary and most effective mitigation. 2. For environments where upgrading is not immediately feasible, disable internal redirects in Envoy configurations to prevent triggering the use-after-free condition. 3. Conduct thorough inventory and auditing of all Envoy deployments across the organization to identify affected versions. 4. Implement enhanced monitoring and logging around Envoy proxy processes to detect abnormal crashes or suspicious behavior indicative of exploitation attempts. 5. Employ network segmentation and strict access controls to limit exposure of Envoy instances to untrusted networks or users. 6. Integrate vulnerability scanning and patch management workflows specifically targeting cloud-native infrastructure components like Envoy. 7. Engage with cloud service providers or managed service vendors to ensure their Envoy components are updated and secured. These steps go beyond generic advice by focusing on configuration changes, operational monitoring, and supply chain considerations specific to Envoy deployments.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-04-13T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf32e4
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 6:21:34 AM
Last updated: 2/7/2026, 1:51:01 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.