CVE-2025-66220: CWE-170: Improper Null Termination in envoyproxy envoy
CVE-2025-66220 is a medium severity vulnerability in Envoy proxy versions up to 1. 36. 2, where improper null termination in the mTLS certificate matcher allows certificates with embedded null bytes in OTHERNAME SAN values to be incorrectly accepted as valid. This flaw could lead to unauthorized access by bypassing certificate validation, impacting confidentiality and integrity without requiring user interaction but needing high privileges and network access. No known exploits are currently reported. European organizations using affected Envoy versions in their service mesh or edge proxy infrastructure should prioritize patching to prevent potential misuse. Countries with significant cloud, telecom, and financial sectors relying on Envoy are at higher risk. Mitigation involves upgrading to fixed versions once available and implementing strict certificate validation policies. The vulnerability’s CVSS score is 5. 0, reflecting moderate risk due to the complexity of exploitation and limited scope of impact.
AI Analysis
Technical Summary
CVE-2025-66220 is a vulnerability identified in the Envoy proxy, a widely used high-performance edge, middle, and service proxy component. The issue stems from improper handling of null termination (CWE-170) in the mTLS certificate matcher, specifically in the match_typed_subject_alt_names feature. Envoy versions 1.33.12 and earlier, as well as versions up to 1.36.2, incorrectly process certificates that contain an embedded null byte (\0) within an OTHERNAME Subject Alternative Name (SAN) field. This improper null termination causes Envoy to treat such malformed certificates as valid matches during mutual TLS (mTLS) authentication. The consequence is a potential bypass of certificate validation, allowing an attacker with the ability to present a crafted certificate containing an embedded null byte to gain unauthorized access or impersonate a legitimate service. The vulnerability requires network access and privileges to present certificates but does not require user interaction. The CVSS v3.1 base score is 5.0, indicating a medium severity level, with high impact on confidentiality, limited impact on integrity, and no impact on availability. No public exploits or active exploitation in the wild have been reported as of the publication date. The vulnerability affects multiple Envoy versions commonly deployed in cloud-native environments, service meshes, and edge proxy setups, making it relevant for organizations relying on Envoy for secure service-to-service communication.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of internal and external communications secured by Envoy’s mTLS. Attackers exploiting this flaw could impersonate legitimate services or intercept sensitive data by bypassing certificate validation, potentially leading to data breaches or unauthorized access to critical systems. Sectors such as finance, telecommunications, cloud service providers, and critical infrastructure operators that rely heavily on Envoy for secure service mesh or edge proxy deployments are particularly vulnerable. The impact is heightened in environments where strict identity verification is essential for compliance with GDPR and other data protection regulations. Although the vulnerability does not affect availability, the compromise of confidentiality and integrity could result in regulatory penalties, reputational damage, and operational disruptions. The lack of known exploits provides a window for proactive mitigation, but the medium severity score suggests that organizations should not delay remediation.
Mitigation Recommendations
Organizations should immediately inventory their Envoy deployments to identify affected versions (<=1.33.12, 1.34.0 to 1.34.10, 1.35.0 to 1.35.6, and 1.36.0 to 1.36.2). Since no patch links are currently provided, monitor official Envoy releases and security advisories for updates addressing this vulnerability and apply patches promptly once available. In the interim, consider implementing stricter certificate validation policies, such as rejecting certificates with embedded null bytes or other malformed SAN entries at the ingress or certificate issuance level. Employ network segmentation and zero-trust principles to limit the exposure of Envoy instances to untrusted networks. Conduct thorough audits of mTLS configurations to ensure they adhere to best practices and do not rely solely on vulnerable matching logic. Additionally, enhance monitoring and logging around certificate validation failures and mTLS handshakes to detect anomalous activity that could indicate exploitation attempts. Engage with certificate authorities to enforce strict certificate issuance policies that prevent malformed certificates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium, Italy, Spain
CVE-2025-66220: CWE-170: Improper Null Termination in envoyproxy envoy
Description
CVE-2025-66220 is a medium severity vulnerability in Envoy proxy versions up to 1. 36. 2, where improper null termination in the mTLS certificate matcher allows certificates with embedded null bytes in OTHERNAME SAN values to be incorrectly accepted as valid. This flaw could lead to unauthorized access by bypassing certificate validation, impacting confidentiality and integrity without requiring user interaction but needing high privileges and network access. No known exploits are currently reported. European organizations using affected Envoy versions in their service mesh or edge proxy infrastructure should prioritize patching to prevent potential misuse. Countries with significant cloud, telecom, and financial sectors relying on Envoy are at higher risk. Mitigation involves upgrading to fixed versions once available and implementing strict certificate validation policies. The vulnerability’s CVSS score is 5. 0, reflecting moderate risk due to the complexity of exploitation and limited scope of impact.
AI-Powered Analysis
Technical Analysis
CVE-2025-66220 is a vulnerability identified in the Envoy proxy, a widely used high-performance edge, middle, and service proxy component. The issue stems from improper handling of null termination (CWE-170) in the mTLS certificate matcher, specifically in the match_typed_subject_alt_names feature. Envoy versions 1.33.12 and earlier, as well as versions up to 1.36.2, incorrectly process certificates that contain an embedded null byte (\0) within an OTHERNAME Subject Alternative Name (SAN) field. This improper null termination causes Envoy to treat such malformed certificates as valid matches during mutual TLS (mTLS) authentication. The consequence is a potential bypass of certificate validation, allowing an attacker with the ability to present a crafted certificate containing an embedded null byte to gain unauthorized access or impersonate a legitimate service. The vulnerability requires network access and privileges to present certificates but does not require user interaction. The CVSS v3.1 base score is 5.0, indicating a medium severity level, with high impact on confidentiality, limited impact on integrity, and no impact on availability. No public exploits or active exploitation in the wild have been reported as of the publication date. The vulnerability affects multiple Envoy versions commonly deployed in cloud-native environments, service meshes, and edge proxy setups, making it relevant for organizations relying on Envoy for secure service-to-service communication.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of internal and external communications secured by Envoy’s mTLS. Attackers exploiting this flaw could impersonate legitimate services or intercept sensitive data by bypassing certificate validation, potentially leading to data breaches or unauthorized access to critical systems. Sectors such as finance, telecommunications, cloud service providers, and critical infrastructure operators that rely heavily on Envoy for secure service mesh or edge proxy deployments are particularly vulnerable. The impact is heightened in environments where strict identity verification is essential for compliance with GDPR and other data protection regulations. Although the vulnerability does not affect availability, the compromise of confidentiality and integrity could result in regulatory penalties, reputational damage, and operational disruptions. The lack of known exploits provides a window for proactive mitigation, but the medium severity score suggests that organizations should not delay remediation.
Mitigation Recommendations
Organizations should immediately inventory their Envoy deployments to identify affected versions (<=1.33.12, 1.34.0 to 1.34.10, 1.35.0 to 1.35.6, and 1.36.0 to 1.36.2). Since no patch links are currently provided, monitor official Envoy releases and security advisories for updates addressing this vulnerability and apply patches promptly once available. In the interim, consider implementing stricter certificate validation policies, such as rejecting certificates with embedded null bytes or other malformed SAN entries at the ingress or certificate issuance level. Employ network segmentation and zero-trust principles to limit the exposure of Envoy instances to untrusted networks. Conduct thorough audits of mTLS configurations to ensure they adhere to best practices and do not rely solely on vulnerable matching logic. Additionally, enhance monitoring and logging around certificate validation failures and mTLS handshakes to detect anomalous activity that could indicate exploitation attempts. Engage with certificate authorities to enforce strict certificate issuance policies that prevent malformed certificates.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-24T23:01:29.679Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693088877d648701e003bbde
Added to database: 12/3/2025, 6:59:19 PM
Last enriched: 12/10/2025, 8:03:24 PM
Last updated: 1/19/2026, 2:44:43 AM
Views: 147
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1133: SQL Injection in Yonyou KSOA
MediumCVE-2026-1132: SQL Injection in Yonyou KSOA
MediumCVE-2026-1131: SQL Injection in Yonyou KSOA
MediumCVE-2026-1130: SQL Injection in Yonyou KSOA
MediumCVE-2026-1129: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.