Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45810: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in envoyproxy envoy

0
Medium
VulnerabilityCVE-2024-45810cvecve-2024-45810cwe-119
Published: Thu Sep 19 2024 (09/19/2024, 23:34:22 UTC)
Source: CVE Database V5
Vendor/Project: envoyproxy
Product: envoy

Description

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling `sendLocalReply` under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the `sendLocalReply()` in http async client, one reason is http async client is duplicating the status code, another one is the destroy of router is called at the destructor of the async stream, while the stream is deferred deleted at first. There will be problems that the stream decoder is destroyed but its reference is called in `router.onDestroy()`, causing segment fault. This will impact ext_authz if the `upgrade` and `connection` header are allowed, and request mirrorring. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

AI-Powered Analysis

AILast updated: 01/30/2026, 20:27:41 UTC

Technical Analysis

CVE-2024-45810 is a vulnerability classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) affecting the Envoy proxy, a widely used cloud-native high-performance edge and service proxy. The flaw occurs in the HTTP asynchronous client component during the execution of the sendLocalReply() function. Specifically, when handling certain conditions such as websocket upgrades and request mirroring, the async client duplicates the HTTP status code and improperly manages the lifecycle of the router and stream objects. The router's onDestroy() method is called on a stream decoder that has already been destroyed due to deferred deletion, causing a use-after-free condition and resulting in a segmentation fault crash. This vulnerability primarily impacts the availability of the Envoy proxy service by causing crashes and denial of service. The issue is particularly relevant when ext_authz filters allow 'upgrade' and 'connection' headers, which are common in websocket and mirrored request scenarios. The vulnerability affects multiple Envoy versions prior to 1.28.7, 1.29.9, 1.30.6, and 1.31.2, where it has been addressed. Exploitation requires network access and low privileges but no user interaction. No known exploits have been reported in the wild, and no effective workarounds exist, making timely patching the only reliable mitigation.

Potential Impact

For European organizations, the impact of CVE-2024-45810 is primarily a denial of service risk due to Envoy proxy crashes. Organizations relying on Envoy for edge routing, service mesh, or API gateway functions may experience service interruptions, degraded performance, or outages, affecting business continuity and user experience. This is critical for sectors with high availability requirements such as finance, telecommunications, healthcare, and public services. Since Envoy is often deployed in cloud-native environments and microservices architectures, the vulnerability could cascade, impacting multiple dependent services. Although the vulnerability does not compromise confidentiality or integrity, the availability impact could disrupt critical infrastructure and services. The absence of known exploits reduces immediate risk, but the ease of triggering the crash and lack of workarounds mean that attackers could weaponize this vulnerability to cause denial of service if they gain network access.

Mitigation Recommendations

The primary mitigation is to upgrade Envoy to one of the patched versions: 1.28.7, 1.29.9, 1.30.6, or 1.31.2 or later. Organizations should audit their deployments to identify affected versions and prioritize patching in environments exposed to untrusted networks. Since no workarounds exist, temporary mitigations could include disabling or restricting the use of ext_authz filters that allow 'upgrade' and 'connection' headers or disabling request mirroring features until patches are applied. Monitoring Envoy logs and metrics for crashes or abnormal restarts can help detect exploitation attempts. Network segmentation and limiting access to Envoy management and data planes can reduce exposure. Additionally, implementing robust service mesh observability and failover mechanisms can mitigate the impact of potential outages caused by this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-09-09T14:23:07.505Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d10c0ac0632022277c28c

Added to database: 1/30/2026, 8:12:48 PM

Last enriched: 1/30/2026, 8:27:41 PM

Last updated: 2/6/2026, 7:32:47 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats