Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26310: CWE-20: Improper Input Validation in envoyproxy envoy

0
Medium
VulnerabilityCVE-2026-26310cvecve-2026-26310cwe-20
Published: Tue Mar 10 2026 (03/10/2026, 19:08:22 UTC)
Source: CVE Database V5
Vendor/Project: envoyproxy
Product: envoy

Description

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.

AI-Powered Analysis

AILast updated: 03/10/2026, 19:45:28 UTC

Technical Analysis

CVE-2026-26310 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the Envoy proxy, a widely used high-performance edge, middle, and service proxy. The flaw exists in the Utility::getAddressWithPort function, which mishandles scoped IPv6 addresses. When this function is called with such addresses, it causes the Envoy process to crash, leading to a denial of service condition. This function is invoked in the data plane by the original_src and dns filters, which are integral to Envoy's network traffic processing. The vulnerability affects multiple versions of Envoy prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, with the issue resolved in these releases. The CVSS v3.1 base score is 5.9, indicating medium severity, with an attack vector of network (remote exploitation), high attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is limited to availability (crash), with no impact on confidentiality or integrity. No public exploits or active exploitation have been reported to date. The root cause is insufficient validation of IPv6 scoped addresses, which are a specific subset of IPv6 addresses used to specify a particular network interface or zone. Improper handling of these addresses leads to a crash, which could be triggered remotely by sending crafted network traffic to an Envoy instance running an affected version.

Potential Impact

The primary impact of this vulnerability is denial of service (DoS) through a crash of the Envoy proxy process. This can disrupt network traffic routing, load balancing, and service mesh operations relying on Envoy, potentially causing outages or degraded service availability. Since Envoy is commonly deployed in cloud-native environments, edge computing, and microservices architectures, a successful exploit could interrupt critical infrastructure components, affecting application uptime and reliability. There is no direct impact on data confidentiality or integrity, but service disruption can have cascading effects on business operations, customer experience, and compliance with service-level agreements. The high attack complexity reduces the likelihood of widespread exploitation, and no authentication or user interaction is required, meaning an unauthenticated attacker with network access to the Envoy instance could trigger the crash. Organizations relying on Envoy in multi-tenant or exposed network environments are particularly at risk of targeted DoS attacks leveraging this vulnerability.

Mitigation Recommendations

Organizations should upgrade affected Envoy instances to the patched versions 1.37.1, 1.36.5, 1.35.8, or 1.34.13 as soon as possible to eliminate the vulnerability. In environments where immediate upgrade is not feasible, network-level mitigations can be applied to restrict or filter traffic containing scoped IPv6 addresses to Envoy instances, reducing exposure to crafted packets that trigger the crash. Monitoring Envoy logs and metrics for unexpected crashes or restarts can help detect exploitation attempts. Implementing redundancy and failover mechanisms for Envoy proxies can mitigate the impact of potential DoS conditions. Additionally, reviewing and hardening network segmentation and access controls to limit exposure of Envoy data plane components to untrusted networks will reduce the attack surface. Security teams should also keep abreast of any emerging exploit reports or proof-of-concept code to adjust defenses accordingly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-13T16:27:51.805Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b071392f860ef943a5fd5a

Added to database: 3/10/2026, 7:30:01 PM

Last enriched: 3/10/2026, 7:45:28 PM

Last updated: 3/10/2026, 8:32:31 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses