Skip to main content

CVE-2025-54588: CWE-416: Use After Free in envoyproxy envoy

High
VulnerabilityCVE-2025-54588cvecve-2025-54588cwe-416
Published: Tue Sep 02 2025 (09/02/2025, 23:39:07 UTC)
Source: CVE Database V5
Vendor/Project: envoyproxy
Product: envoy

Description

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. Versions 1.34.0 through 1.34.4 and 1.35.0 contain a use-after-free (UAF) vulnerability in the DNS cache, causing abnormal process termination. The vulnerability is in Envoy's Dynamic Forward Proxy implementation, occurring when a completion callback for a DNS resolution triggers new DNS resolutions or removes existing pending resolutions. This condition may occur when the following conditions are met: dynamic Forwarding Filter is enabled, the `envoy.reloadable_features.dfp_cluster_resolves_hosts` runtime flag is enabled, and the Host header is modified between the Dynamic Forwarding Filter and Router filters. This issue is resolved in versions 1.34.5 and 1.35.1. To work around this issue, set the envoy.reloadable_features.dfp_cluster_resolves_hosts runtime flag to false.

AI-Powered Analysis

AILast updated: 09/03/2025, 00:02:45 UTC

Technical Analysis

CVE-2025-54588 is a high-severity use-after-free (UAF) vulnerability affecting the Envoy proxy, specifically versions 1.34.0 through 1.34.4 and 1.35.0. Envoy is a widely used open-source Layer 7 proxy and communication bus designed for modern service-oriented architectures, often deployed in microservices environments to manage service-to-service communication. The vulnerability resides in Envoy's Dynamic Forward Proxy implementation, particularly within the DNS cache handling mechanism. The flaw occurs when a DNS resolution completion callback triggers additional DNS resolutions or removes pending resolutions, leading to a use-after-free condition. This can cause abnormal process termination (crashes), impacting the availability of the proxy service. The vulnerability manifests only under specific conditions: the dynamic Forwarding Filter must be enabled, the runtime flag `envoy.reloadable_features.dfp_cluster_resolves_hosts` must be set to true, and the Host header must be modified between the Dynamic Forwarding Filter and Router filters. The issue has been addressed in versions 1.34.5 and 1.35.1. Until patching, a workaround is to disable the runtime flag by setting `envoy.reloadable_features.dfp_cluster_resolves_hosts` to false. The CVSS 3.1 score is 7.5 (high severity) with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating that the vulnerability is remotely exploitable without authentication or user interaction, and impacts availability but not confidentiality or integrity. No known exploits are reported in the wild yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of critical network infrastructure components that rely on Envoy proxies for service mesh, API gateway, or edge proxy functions. Disruption of Envoy instances due to crashes can lead to service outages, degraded performance, and potential cascading failures in microservices architectures. Organizations in sectors such as finance, telecommunications, healthcare, and government—where high availability and reliability are paramount—may experience operational disruptions. Additionally, since Envoy is often used in cloud-native environments and Kubernetes clusters, the vulnerability could affect cloud service providers and enterprises leveraging container orchestration, potentially impacting large-scale deployments. Although the vulnerability does not directly compromise confidentiality or integrity, denial of service conditions can indirectly affect business continuity and service-level agreements (SLAs).

Mitigation Recommendations

European organizations should prioritize upgrading Envoy to versions 1.34.5 or 1.35.1 where the vulnerability is fixed. If immediate patching is not feasible, the recommended workaround is to disable the runtime flag `envoy.reloadable_features.dfp_cluster_resolves_hosts` by setting it to false, which prevents the vulnerable code path from being exercised. Additionally, organizations should audit their Envoy configurations to verify whether the dynamic Forwarding Filter is enabled and whether Host header modifications occur between the Dynamic Forwarding Filter and Router filters, as these conditions are required to trigger the vulnerability. Monitoring Envoy logs for abnormal process terminations can help detect exploitation attempts or crashes. Implementing robust process supervision and automatic restart mechanisms can mitigate service disruption impact. Network segmentation and limiting exposure of Envoy instances to untrusted networks can reduce attack surface. Finally, organizations should stay alert for any emerging exploit reports and apply security updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-25T16:19:16.094Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b78223ad5a09ad00e9adff

Added to database: 9/2/2025, 11:47:47 PM

Last enriched: 9/3/2025, 12:02:45 AM

Last updated: 9/3/2025, 1:09:34 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats