Skip to main content

CVE-2024-23327: CWE-476: NULL Pointer Dereference in envoyproxy envoy

High
VulnerabilityCVE-2024-23327cvecve-2024-23327cwe-476
Published: Fri Feb 09 2024 (02/09/2024, 22:41:54 UTC)
Source: CVE Database V5
Vendor/Project: envoyproxy
Product: envoy

Description

Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does not have the protocol block. This issue has been addressed in releases 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

AI-Powered Analysis

AILast updated: 07/10/2025, 22:19:45 UTC

Technical Analysis

CVE-2024-23327 is a high-severity vulnerability affecting Envoy Proxy, a widely used high-performance edge, middle, and service proxy. The vulnerability is a NULL pointer dereference (CWE-476) that occurs when Proxy Protocol version 2 (PPv2) is enabled both on a listener and a subsequent cluster. Specifically, the Envoy instance will experience a segmentation fault (crash) when attempting to craft the upstream PPv2 header if the downstream request has a command type of LOCAL and lacks the protocol block. This results in the proxy process crashing, causing a denial of service (DoS) condition. The issue affects multiple versions of Envoy, including all versions from 1.26.0 up to but not including patched releases 1.26.7, 1.27.3, 1.28.1, and 1.29.1. The vulnerability requires no privileges or user interaction to exploit and can be triggered remotely by sending crafted requests that meet the conditions described. There are currently no known exploits in the wild, and no workarounds exist other than upgrading to a fixed version. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low complexity, no privileges required, no user interaction, and an impact limited to availability (service crash).

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Envoy Proxy as a critical component in their infrastructure, such as cloud providers, telecom operators, financial institutions, and large enterprises using service mesh architectures or edge proxies. A successful exploitation leads to a denial of service by crashing the Envoy process, potentially disrupting traffic flow, degrading application availability, and causing outages in services dependent on Envoy for load balancing, routing, or security enforcement. This can affect customer-facing applications and internal services, leading to operational downtime and potential financial and reputational damage. Given Envoy's popularity in modern microservices and cloud-native environments, the vulnerability could be exploited to target high-value infrastructure components. The lack of known exploits currently reduces immediate risk, but the ease of triggering the crash and the absence of workarounds necessitate prompt remediation to avoid service disruptions.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade Envoy Proxy to one of the patched versions: 1.26.7, 1.27.3, 1.28.1, or 1.29.1 or later. Organizations should prioritize this update in their patch management cycles. In environments where immediate upgrade is not feasible, consider temporarily disabling Proxy Protocol v2 on listeners and clusters to prevent the vulnerable code path from being exercised, though this may impact legitimate traffic handling and should be tested carefully. Additionally, implement network-level protections such as filtering or rate limiting traffic that could trigger the vulnerability, especially from untrusted sources. Monitoring Envoy logs and metrics for unexpected crashes or restarts can help detect exploitation attempts. Finally, incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2024-01-15T15:19:19.441Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5b1b0bd07c3938bd86

Added to database: 6/10/2025, 6:54:19 PM

Last enriched: 7/10/2025, 10:19:45 PM

Last updated: 8/16/2025, 8:53:29 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats