CVE-2026-26309: CWE-193: Off-by-one Error in envoyproxy envoy
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, an off-by-one write in Envoy::JsonEscaper::escapeString() can corrupt std::string null-termination, causing undefined behavior and potentially leading to crashes or out-of-bounds reads when the resulting string is later treated as a C-string. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
AI Analysis
Technical Summary
CVE-2026-26309 is a medium severity vulnerability classified as CWE-193 (Off-by-one Error) found in the Envoy proxy, a widely used high-performance edge, middle, and service proxy. The flaw exists in the JsonEscaper::escapeString() function, where an off-by-one write operation corrupts the null-termination character of a std::string. This corruption leads to undefined behavior when the string is later interpreted as a C-string, potentially causing out-of-bounds reads or application crashes. The vulnerability affects multiple Envoy versions: all releases prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13 are impacted. The issue can be triggered remotely without authentication or user interaction, as it involves processing JSON strings within Envoy’s proxying operations. Although no exploits have been observed in the wild, the vulnerability poses a risk to availability by enabling denial-of-service conditions through crashes. The root cause is a classic off-by-one boundary error in string handling, a common source of memory corruption bugs in C++ applications. The Envoy project has addressed the issue by correcting the string termination logic in the specified patched versions. Given Envoy’s role in cloud-native environments, service meshes, and edge routing, this vulnerability is relevant to a broad range of organizations deploying modern microservices architectures.
Potential Impact
The primary impact of CVE-2026-26309 is on the availability of services relying on vulnerable Envoy proxy versions. The off-by-one error can cause Envoy to crash or behave unpredictably when processing certain JSON strings, potentially leading to denial-of-service conditions. While confidentiality and integrity are not directly affected, service disruption can degrade user experience and impact dependent applications. Organizations using Envoy in critical infrastructure, cloud platforms, or service mesh deployments may face outages or instability if exploited. The vulnerability requires no authentication or user interaction, increasing the risk of remote exploitation. Although no active exploits are known, the widespread use of Envoy in modern cloud-native environments means that many organizations worldwide could be affected if attackers develop exploits. The impact is particularly significant for high-availability environments where proxy stability is essential for service continuity.
Mitigation Recommendations
To mitigate CVE-2026-26309, organizations should promptly upgrade Envoy to the fixed versions 1.37.1, 1.36.5, 1.35.8, or 1.34.13 depending on their current deployment version. In addition to patching, it is advisable to implement robust input validation and monitoring for abnormal proxy crashes or error patterns that could indicate exploitation attempts. Employing runtime protections such as memory safety tools (e.g., AddressSanitizer) during testing can help detect similar off-by-one errors early. Network-level protections like rate limiting and filtering suspicious traffic can reduce exposure to malformed JSON payloads. For environments using Envoy as part of a service mesh, ensure that control plane components are also updated to avoid cascading failures. Regularly review and audit proxy configurations and logs to detect anomalies. Finally, maintain an incident response plan that includes steps for rapid patch deployment and service restoration in case of a denial-of-service event.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, Singapore
CVE-2026-26309: CWE-193: Off-by-one Error in envoyproxy envoy
Description
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, an off-by-one write in Envoy::JsonEscaper::escapeString() can corrupt std::string null-termination, causing undefined behavior and potentially leading to crashes or out-of-bounds reads when the resulting string is later treated as a C-string. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
AI-Powered Analysis
Technical Analysis
CVE-2026-26309 is a medium severity vulnerability classified as CWE-193 (Off-by-one Error) found in the Envoy proxy, a widely used high-performance edge, middle, and service proxy. The flaw exists in the JsonEscaper::escapeString() function, where an off-by-one write operation corrupts the null-termination character of a std::string. This corruption leads to undefined behavior when the string is later interpreted as a C-string, potentially causing out-of-bounds reads or application crashes. The vulnerability affects multiple Envoy versions: all releases prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13 are impacted. The issue can be triggered remotely without authentication or user interaction, as it involves processing JSON strings within Envoy’s proxying operations. Although no exploits have been observed in the wild, the vulnerability poses a risk to availability by enabling denial-of-service conditions through crashes. The root cause is a classic off-by-one boundary error in string handling, a common source of memory corruption bugs in C++ applications. The Envoy project has addressed the issue by correcting the string termination logic in the specified patched versions. Given Envoy’s role in cloud-native environments, service meshes, and edge routing, this vulnerability is relevant to a broad range of organizations deploying modern microservices architectures.
Potential Impact
The primary impact of CVE-2026-26309 is on the availability of services relying on vulnerable Envoy proxy versions. The off-by-one error can cause Envoy to crash or behave unpredictably when processing certain JSON strings, potentially leading to denial-of-service conditions. While confidentiality and integrity are not directly affected, service disruption can degrade user experience and impact dependent applications. Organizations using Envoy in critical infrastructure, cloud platforms, or service mesh deployments may face outages or instability if exploited. The vulnerability requires no authentication or user interaction, increasing the risk of remote exploitation. Although no active exploits are known, the widespread use of Envoy in modern cloud-native environments means that many organizations worldwide could be affected if attackers develop exploits. The impact is particularly significant for high-availability environments where proxy stability is essential for service continuity.
Mitigation Recommendations
To mitigate CVE-2026-26309, organizations should promptly upgrade Envoy to the fixed versions 1.37.1, 1.36.5, 1.35.8, or 1.34.13 depending on their current deployment version. In addition to patching, it is advisable to implement robust input validation and monitoring for abnormal proxy crashes or error patterns that could indicate exploitation attempts. Employing runtime protections such as memory safety tools (e.g., AddressSanitizer) during testing can help detect similar off-by-one errors early. Network-level protections like rate limiting and filtering suspicious traffic can reduce exposure to malformed JSON payloads. For environments using Envoy as part of a service mesh, ensure that control plane components are also updated to avoid cascading failures. Regularly review and audit proxy configurations and logs to detect anomalies. Finally, maintain an incident response plan that includes steps for rapid patch deployment and service restoration in case of a denial-of-service event.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-13T16:27:51.805Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b071392f860ef943a5fd57
Added to database: 3/10/2026, 7:30:01 PM
Last enriched: 3/10/2026, 7:45:48 PM
Last updated: 3/12/2026, 11:40:07 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.