CVE-2024-45810: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in envoyproxy envoy
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling `sendLocalReply` under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the `sendLocalReply()` in http async client, one reason is http async client is duplicating the status code, another one is the destroy of router is called at the destructor of the async stream, while the stream is deferred deleted at first. There will be problems that the stream decoder is destroyed but its reference is called in `router.onDestroy()`, causing segment fault. This will impact ext_authz if the `upgrade` and `connection` header are allowed, and request mirrorring. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
AI Analysis
Technical Summary
CVE-2024-45810 is a vulnerability classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) affecting the Envoy proxy, a widely used cloud-native high-performance edge and service proxy. The flaw occurs in the HTTP asynchronous client component during the execution of the sendLocalReply() function. Specifically, when handling certain conditions such as websocket upgrades and request mirroring, the async client duplicates the HTTP status code and improperly manages the lifecycle of the router and stream objects. The router's onDestroy() method is called on a stream decoder that has already been destroyed due to deferred deletion, causing a use-after-free condition and resulting in a segmentation fault crash. This vulnerability primarily impacts the availability of the Envoy proxy service by causing crashes and denial of service. The issue is particularly relevant when ext_authz filters allow 'upgrade' and 'connection' headers, which are common in websocket and mirrored request scenarios. The vulnerability affects multiple Envoy versions prior to 1.28.7, 1.29.9, 1.30.6, and 1.31.2, where it has been addressed. Exploitation requires network access and low privileges but no user interaction. No known exploits have been reported in the wild, and no effective workarounds exist, making timely patching the only reliable mitigation.
Potential Impact
For European organizations, the impact of CVE-2024-45810 is primarily a denial of service risk due to Envoy proxy crashes. Organizations relying on Envoy for edge routing, service mesh, or API gateway functions may experience service interruptions, degraded performance, or outages, affecting business continuity and user experience. This is critical for sectors with high availability requirements such as finance, telecommunications, healthcare, and public services. Since Envoy is often deployed in cloud-native environments and microservices architectures, the vulnerability could cascade, impacting multiple dependent services. Although the vulnerability does not compromise confidentiality or integrity, the availability impact could disrupt critical infrastructure and services. The absence of known exploits reduces immediate risk, but the ease of triggering the crash and lack of workarounds mean that attackers could weaponize this vulnerability to cause denial of service if they gain network access.
Mitigation Recommendations
The primary mitigation is to upgrade Envoy to one of the patched versions: 1.28.7, 1.29.9, 1.30.6, or 1.31.2 or later. Organizations should audit their deployments to identify affected versions and prioritize patching in environments exposed to untrusted networks. Since no workarounds exist, temporary mitigations could include disabling or restricting the use of ext_authz filters that allow 'upgrade' and 'connection' headers or disabling request mirroring features until patches are applied. Monitoring Envoy logs and metrics for crashes or abnormal restarts can help detect exploitation attempts. Network segmentation and limiting access to Envoy management and data planes can reduce exposure. Additionally, implementing robust service mesh observability and failover mechanisms can mitigate the impact of potential outages caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Italy
CVE-2024-45810: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in envoyproxy envoy
Description
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling `sendLocalReply` under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the `sendLocalReply()` in http async client, one reason is http async client is duplicating the status code, another one is the destroy of router is called at the destructor of the async stream, while the stream is deferred deleted at first. There will be problems that the stream decoder is destroyed but its reference is called in `router.onDestroy()`, causing segment fault. This will impact ext_authz if the `upgrade` and `connection` header are allowed, and request mirrorring. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-45810 is a vulnerability classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) affecting the Envoy proxy, a widely used cloud-native high-performance edge and service proxy. The flaw occurs in the HTTP asynchronous client component during the execution of the sendLocalReply() function. Specifically, when handling certain conditions such as websocket upgrades and request mirroring, the async client duplicates the HTTP status code and improperly manages the lifecycle of the router and stream objects. The router's onDestroy() method is called on a stream decoder that has already been destroyed due to deferred deletion, causing a use-after-free condition and resulting in a segmentation fault crash. This vulnerability primarily impacts the availability of the Envoy proxy service by causing crashes and denial of service. The issue is particularly relevant when ext_authz filters allow 'upgrade' and 'connection' headers, which are common in websocket and mirrored request scenarios. The vulnerability affects multiple Envoy versions prior to 1.28.7, 1.29.9, 1.30.6, and 1.31.2, where it has been addressed. Exploitation requires network access and low privileges but no user interaction. No known exploits have been reported in the wild, and no effective workarounds exist, making timely patching the only reliable mitigation.
Potential Impact
For European organizations, the impact of CVE-2024-45810 is primarily a denial of service risk due to Envoy proxy crashes. Organizations relying on Envoy for edge routing, service mesh, or API gateway functions may experience service interruptions, degraded performance, or outages, affecting business continuity and user experience. This is critical for sectors with high availability requirements such as finance, telecommunications, healthcare, and public services. Since Envoy is often deployed in cloud-native environments and microservices architectures, the vulnerability could cascade, impacting multiple dependent services. Although the vulnerability does not compromise confidentiality or integrity, the availability impact could disrupt critical infrastructure and services. The absence of known exploits reduces immediate risk, but the ease of triggering the crash and lack of workarounds mean that attackers could weaponize this vulnerability to cause denial of service if they gain network access.
Mitigation Recommendations
The primary mitigation is to upgrade Envoy to one of the patched versions: 1.28.7, 1.29.9, 1.30.6, or 1.31.2 or later. Organizations should audit their deployments to identify affected versions and prioritize patching in environments exposed to untrusted networks. Since no workarounds exist, temporary mitigations could include disabling or restricting the use of ext_authz filters that allow 'upgrade' and 'connection' headers or disabling request mirroring features until patches are applied. Monitoring Envoy logs and metrics for crashes or abnormal restarts can help detect exploitation attempts. Network segmentation and limiting access to Envoy management and data planes can reduce exposure. Additionally, implementing robust service mesh observability and failover mechanisms can mitigate the impact of potential outages caused by this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-09-09T14:23:07.505Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d10c0ac0632022277c28c
Added to database: 1/30/2026, 8:12:48 PM
Last enriched: 1/30/2026, 8:27:41 PM
Last updated: 2/6/2026, 7:32:47 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25727: CWE-121: Stack-based Buffer Overflow in time-rs time
MediumCVE-2026-25643: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in blakeblackshear frigate
CriticalCVE-2026-1709: Key Exchange without Entity Authentication in Red Hat Red Hat Enterprise Linux 10
CriticalCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-2063: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.