CVE-2025-64527: CWE-476: NULL Pointer Dereference in envoyproxy envoy
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy crashes when JWT authentication is configured with the remote JWKS fetching, allow_missing_or_failed is enabled, multiple JWT tokens are present in the request headers and the JWKS fetch fails. This is caused by a re-entry bug in the JwksFetcherImpl. When the first token's JWKS fetch fails, onJwksError() callback triggers processing of the second token, which calls fetch() again on the same fetcher object. The original callback's reset() then clears the second fetch's state (receiver_ and request_) which causes a crash when the async HTTP response arrives.
AI Analysis
Technical Summary
CVE-2025-64527 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting the Envoy proxy, a widely used high-performance edge and service proxy. The issue exists in versions 1.33.12 and earlier, as well as in specific ranges up to 1.36.2. The vulnerability manifests when JWT authentication is configured to fetch JWKS (JSON Web Key Sets) remotely, with the allow_missing_or_failed flag enabled. If multiple JWT tokens are included in request headers and the JWKS fetch for the first token fails, the onJwksError() callback triggers processing of the second token, which calls fetch() again on the same JwksFetcherImpl instance. Due to a re-entry bug, the original callback's reset() method clears internal state variables (receiver_ and request_) of the second fetch operation. When the asynchronous HTTP response for the second fetch arrives, the cleared state causes a NULL pointer dereference, crashing the Envoy process. This crash results in a denial of service (DoS) condition, impacting availability but not confidentiality or integrity. The vulnerability requires low privileges (PR:L), no user interaction (UI:N), and can be exploited remotely (AV:N). The CVSS v3.1 base score is 6.5, indicating medium severity. No public exploits have been reported to date. The root cause is improper state management in asynchronous JWKS fetching logic under specific JWT authentication configurations.
Potential Impact
The primary impact of CVE-2025-64527 is on the availability of Envoy proxy services. A successful exploitation causes the Envoy process to crash, resulting in denial of service. For European organizations, this can disrupt critical edge, middle, or service proxy functions, potentially affecting web application delivery, API gateways, and microservices communication. Organizations relying on JWT authentication with remote JWKS fetching and the allow_missing_or_failed option are particularly vulnerable. Disruptions could lead to service outages, degraded user experience, and operational downtime. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can have cascading effects on business continuity, especially in sectors like finance, healthcare, and public services where Envoy is deployed. The medium severity score reflects the moderate risk given the ease of triggering the crash remotely without user interaction, but limited to specific configurations and versions. European cloud providers, telecom operators, and enterprises with modern service mesh architectures are at higher risk due to their adoption of Envoy in production environments.
Mitigation Recommendations
To mitigate CVE-2025-64527, European organizations should immediately identify Envoy proxy instances running affected versions (<=1.36.2, including 1.33.12 and earlier). The primary remediation is to upgrade Envoy to a patched version where this NULL pointer dereference bug is fixed; organizations should monitor official Envoy releases and security advisories for updates. As a temporary workaround, administrators can disable the allow_missing_or_failed option in JWT authentication configurations to prevent the re-entry bug from triggering. Additionally, reviewing JWT token handling to limit multiple tokens in request headers can reduce exposure. Implementing robust monitoring and alerting for Envoy process crashes will help detect exploitation attempts early. Network-level protections such as rate limiting and filtering suspicious requests with multiple JWT tokens can further reduce risk. Finally, conducting thorough testing of JWT authentication flows in staging environments before deployment can prevent misconfigurations that enable this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-64527: CWE-476: NULL Pointer Dereference in envoyproxy envoy
Description
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy crashes when JWT authentication is configured with the remote JWKS fetching, allow_missing_or_failed is enabled, multiple JWT tokens are present in the request headers and the JWKS fetch fails. This is caused by a re-entry bug in the JwksFetcherImpl. When the first token's JWKS fetch fails, onJwksError() callback triggers processing of the second token, which calls fetch() again on the same fetcher object. The original callback's reset() then clears the second fetch's state (receiver_ and request_) which causes a crash when the async HTTP response arrives.
AI-Powered Analysis
Technical Analysis
CVE-2025-64527 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting the Envoy proxy, a widely used high-performance edge and service proxy. The issue exists in versions 1.33.12 and earlier, as well as in specific ranges up to 1.36.2. The vulnerability manifests when JWT authentication is configured to fetch JWKS (JSON Web Key Sets) remotely, with the allow_missing_or_failed flag enabled. If multiple JWT tokens are included in request headers and the JWKS fetch for the first token fails, the onJwksError() callback triggers processing of the second token, which calls fetch() again on the same JwksFetcherImpl instance. Due to a re-entry bug, the original callback's reset() method clears internal state variables (receiver_ and request_) of the second fetch operation. When the asynchronous HTTP response for the second fetch arrives, the cleared state causes a NULL pointer dereference, crashing the Envoy process. This crash results in a denial of service (DoS) condition, impacting availability but not confidentiality or integrity. The vulnerability requires low privileges (PR:L), no user interaction (UI:N), and can be exploited remotely (AV:N). The CVSS v3.1 base score is 6.5, indicating medium severity. No public exploits have been reported to date. The root cause is improper state management in asynchronous JWKS fetching logic under specific JWT authentication configurations.
Potential Impact
The primary impact of CVE-2025-64527 is on the availability of Envoy proxy services. A successful exploitation causes the Envoy process to crash, resulting in denial of service. For European organizations, this can disrupt critical edge, middle, or service proxy functions, potentially affecting web application delivery, API gateways, and microservices communication. Organizations relying on JWT authentication with remote JWKS fetching and the allow_missing_or_failed option are particularly vulnerable. Disruptions could lead to service outages, degraded user experience, and operational downtime. Although the vulnerability does not compromise confidentiality or integrity, the loss of availability can have cascading effects on business continuity, especially in sectors like finance, healthcare, and public services where Envoy is deployed. The medium severity score reflects the moderate risk given the ease of triggering the crash remotely without user interaction, but limited to specific configurations and versions. European cloud providers, telecom operators, and enterprises with modern service mesh architectures are at higher risk due to their adoption of Envoy in production environments.
Mitigation Recommendations
To mitigate CVE-2025-64527, European organizations should immediately identify Envoy proxy instances running affected versions (<=1.36.2, including 1.33.12 and earlier). The primary remediation is to upgrade Envoy to a patched version where this NULL pointer dereference bug is fixed; organizations should monitor official Envoy releases and security advisories for updates. As a temporary workaround, administrators can disable the allow_missing_or_failed option in JWT authentication configurations to prevent the re-entry bug from triggering. Additionally, reviewing JWT token handling to limit multiple tokens in request headers can reduce exposure. Implementing robust monitoring and alerting for Envoy process crashes will help detect exploitation attempts early. Network-level protections such as rate limiting and filtering suspicious requests with multiple JWT tokens can further reduce risk. Finally, conducting thorough testing of JWT authentication flows in staging environments before deployment can prevent misconfigurations that enable this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-05T21:15:39.401Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693081947d648701e0f83592
Added to database: 12/3/2025, 6:29:40 PM
Last enriched: 12/3/2025, 6:36:54 PM
Last updated: 12/5/2025, 2:42:07 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12804: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevelop Booking Calendar
MediumCVE-2025-11759: CWE-352 Cross-Site Request Forgery (CSRF) in watchful Backup, Restore and Migrate your sites with XCloner
MediumCVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.