Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26309: CWE-193: Off-by-one Error in envoyproxy envoy

0
Medium
VulnerabilityCVE-2026-26309cvecve-2026-26309cwe-193
Published: Tue Mar 10 2026 (03/10/2026, 19:04:21 UTC)
Source: CVE Database V5
Vendor/Project: envoyproxy
Product: envoy

Description

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, an off-by-one write in Envoy::JsonEscaper::escapeString() can corrupt std::string null-termination, causing undefined behavior and potentially leading to crashes or out-of-bounds reads when the resulting string is later treated as a C-string. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.

AI-Powered Analysis

AILast updated: 03/10/2026, 19:45:48 UTC

Technical Analysis

CVE-2026-26309 is a medium severity vulnerability classified as CWE-193 (Off-by-one Error) found in the Envoy proxy, a widely used high-performance edge, middle, and service proxy. The flaw exists in the JsonEscaper::escapeString() function, where an off-by-one write operation corrupts the null-termination character of a std::string. This corruption leads to undefined behavior when the string is later interpreted as a C-string, potentially causing out-of-bounds reads or application crashes. The vulnerability affects multiple Envoy versions: all releases prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13 are impacted. The issue can be triggered remotely without authentication or user interaction, as it involves processing JSON strings within Envoy’s proxying operations. Although no exploits have been observed in the wild, the vulnerability poses a risk to availability by enabling denial-of-service conditions through crashes. The root cause is a classic off-by-one boundary error in string handling, a common source of memory corruption bugs in C++ applications. The Envoy project has addressed the issue by correcting the string termination logic in the specified patched versions. Given Envoy’s role in cloud-native environments, service meshes, and edge routing, this vulnerability is relevant to a broad range of organizations deploying modern microservices architectures.

Potential Impact

The primary impact of CVE-2026-26309 is on the availability of services relying on vulnerable Envoy proxy versions. The off-by-one error can cause Envoy to crash or behave unpredictably when processing certain JSON strings, potentially leading to denial-of-service conditions. While confidentiality and integrity are not directly affected, service disruption can degrade user experience and impact dependent applications. Organizations using Envoy in critical infrastructure, cloud platforms, or service mesh deployments may face outages or instability if exploited. The vulnerability requires no authentication or user interaction, increasing the risk of remote exploitation. Although no active exploits are known, the widespread use of Envoy in modern cloud-native environments means that many organizations worldwide could be affected if attackers develop exploits. The impact is particularly significant for high-availability environments where proxy stability is essential for service continuity.

Mitigation Recommendations

To mitigate CVE-2026-26309, organizations should promptly upgrade Envoy to the fixed versions 1.37.1, 1.36.5, 1.35.8, or 1.34.13 depending on their current deployment version. In addition to patching, it is advisable to implement robust input validation and monitoring for abnormal proxy crashes or error patterns that could indicate exploitation attempts. Employing runtime protections such as memory safety tools (e.g., AddressSanitizer) during testing can help detect similar off-by-one errors early. Network-level protections like rate limiting and filtering suspicious traffic can reduce exposure to malformed JSON payloads. For environments using Envoy as part of a service mesh, ensure that control plane components are also updated to avoid cascading failures. Regularly review and audit proxy configurations and logs to detect anomalies. Finally, maintain an incident response plan that includes steps for rapid patch deployment and service restoration in case of a denial-of-service event.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-13T16:27:51.805Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b071392f860ef943a5fd57

Added to database: 3/10/2026, 7:30:01 PM

Last enriched: 3/10/2026, 7:45:48 PM

Last updated: 3/12/2026, 11:40:07 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses