CVE-2026-26311: CWE-416: Use After Free in envoyproxy envoy
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, a logic vulnerability in Envoy's HTTP connection manager (FilterManager) that allows for Zombie Stream Filter Execution. This issue creates a "Use-After-Free" (UAF) or state-corruption window where filter callbacks are invoked on an HTTP stream that has already been logically reset and cleaned up. The vulnerability resides in source/common/http/filter_manager.cc within the FilterManager::decodeData method. The ActiveStream object remains valid in memory during the deferred deletion window. If a DATA frame arrives on this stream immediately after the reset (e.g., in the same packet processing cycle), the HTTP/2 codec invokes ActiveStream::decodeData, which cascades to FilterManager::decodeData. FilterManager::decodeData fails to check the saw_downstream_reset_ flag. It iterates over the decoder_filters_ list and invokes decodeData() on filters that have already received onDestroy(). This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
AI Analysis
Technical Summary
Envoy is a widely used high-performance edge and service proxy that handles HTTP/2 traffic among other protocols. CVE-2026-26311 is a Use-After-Free (UAF) vulnerability classified under CWE-416, discovered in Envoy's HTTP connection manager component, specifically within the FilterManager::decodeData method. The vulnerability stems from a logic flaw where the ActiveStream object remains in memory during a deferred deletion window after a stream reset. If a DATA frame arrives immediately after the reset, the HTTP/2 codec calls ActiveStream::decodeData, which cascades to FilterManager::decodeData. However, FilterManager::decodeData fails to check the saw_downstream_reset_ flag before iterating over decoder filters and invoking decodeData on filters that have already been destroyed (onDestroy called). This results in callbacks executing on freed memory, causing use-after-free conditions or state corruption. The affected Envoy versions include all releases before 1.37.1, 1.36.5, 1.35.8, and 1.34.13. The vulnerability can lead to crashes or destabilization of the proxy, potentially causing denial of service. Exploitation requires no authentication or user interaction but does require network access to send crafted HTTP/2 frames. No public exploits have been reported yet. The issue was fixed by adding proper checks to prevent filter callbacks on reset streams. The CVSS v3.1 score is 5.9 (medium severity) with vector AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, high attack complexity, no privileges or user interaction needed, unchanged scope, no confidentiality or integrity impact, but high availability impact.
Potential Impact
The primary impact of CVE-2026-26311 is denial of service (DoS) due to crashes or unstable behavior of the Envoy proxy when processing specially crafted HTTP/2 traffic. This can disrupt service availability for applications relying on Envoy as an edge or service proxy, potentially affecting load balancing, API gateway functions, and service mesh communications. Since Envoy is widely deployed in cloud-native environments, microservices architectures, and large-scale infrastructures, affected organizations may experience outages or degraded performance. Although there is no direct confidentiality or integrity compromise, the DoS impact can indirectly affect business operations, customer experience, and service-level agreements. The attack complexity is high, requiring precise timing of HTTP/2 frames, which may limit exploitation but does not eliminate the risk. No known exploits in the wild reduce immediate threat, but the vulnerability remains a risk until patched. Organizations running vulnerable Envoy versions in production environments are at risk of service disruption.
Mitigation Recommendations
Organizations should upgrade Envoy to the fixed versions 1.37.1, 1.36.5, 1.35.8, or 1.34.13 as soon as possible to eliminate the vulnerability. In environments where immediate upgrade is not feasible, consider deploying network-level protections such as HTTP/2 frame inspection and rate limiting to detect and block suspicious or malformed DATA frames arriving immediately after stream resets. Implement robust monitoring and alerting on Envoy proxy logs and metrics to detect abnormal crashes or restarts that may indicate exploitation attempts. Use canary or staged deployments to validate the stability of the patched versions before full rollout. Additionally, review and harden HTTP/2 traffic handling policies and consider isolating critical Envoy instances behind additional layers of defense to reduce exposure. Regularly audit and update all proxy and service mesh components to maintain security posture.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, Canada, Australia, Netherlands, Singapore
CVE-2026-26311: CWE-416: Use After Free in envoyproxy envoy
Description
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, a logic vulnerability in Envoy's HTTP connection manager (FilterManager) that allows for Zombie Stream Filter Execution. This issue creates a "Use-After-Free" (UAF) or state-corruption window where filter callbacks are invoked on an HTTP stream that has already been logically reset and cleaned up. The vulnerability resides in source/common/http/filter_manager.cc within the FilterManager::decodeData method. The ActiveStream object remains valid in memory during the deferred deletion window. If a DATA frame arrives on this stream immediately after the reset (e.g., in the same packet processing cycle), the HTTP/2 codec invokes ActiveStream::decodeData, which cascades to FilterManager::decodeData. FilterManager::decodeData fails to check the saw_downstream_reset_ flag. It iterates over the decoder_filters_ list and invokes decodeData() on filters that have already received onDestroy(). This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
AI-Powered Analysis
Technical Analysis
Envoy is a widely used high-performance edge and service proxy that handles HTTP/2 traffic among other protocols. CVE-2026-26311 is a Use-After-Free (UAF) vulnerability classified under CWE-416, discovered in Envoy's HTTP connection manager component, specifically within the FilterManager::decodeData method. The vulnerability stems from a logic flaw where the ActiveStream object remains in memory during a deferred deletion window after a stream reset. If a DATA frame arrives immediately after the reset, the HTTP/2 codec calls ActiveStream::decodeData, which cascades to FilterManager::decodeData. However, FilterManager::decodeData fails to check the saw_downstream_reset_ flag before iterating over decoder filters and invoking decodeData on filters that have already been destroyed (onDestroy called). This results in callbacks executing on freed memory, causing use-after-free conditions or state corruption. The affected Envoy versions include all releases before 1.37.1, 1.36.5, 1.35.8, and 1.34.13. The vulnerability can lead to crashes or destabilization of the proxy, potentially causing denial of service. Exploitation requires no authentication or user interaction but does require network access to send crafted HTTP/2 frames. No public exploits have been reported yet. The issue was fixed by adding proper checks to prevent filter callbacks on reset streams. The CVSS v3.1 score is 5.9 (medium severity) with vector AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, high attack complexity, no privileges or user interaction needed, unchanged scope, no confidentiality or integrity impact, but high availability impact.
Potential Impact
The primary impact of CVE-2026-26311 is denial of service (DoS) due to crashes or unstable behavior of the Envoy proxy when processing specially crafted HTTP/2 traffic. This can disrupt service availability for applications relying on Envoy as an edge or service proxy, potentially affecting load balancing, API gateway functions, and service mesh communications. Since Envoy is widely deployed in cloud-native environments, microservices architectures, and large-scale infrastructures, affected organizations may experience outages or degraded performance. Although there is no direct confidentiality or integrity compromise, the DoS impact can indirectly affect business operations, customer experience, and service-level agreements. The attack complexity is high, requiring precise timing of HTTP/2 frames, which may limit exploitation but does not eliminate the risk. No known exploits in the wild reduce immediate threat, but the vulnerability remains a risk until patched. Organizations running vulnerable Envoy versions in production environments are at risk of service disruption.
Mitigation Recommendations
Organizations should upgrade Envoy to the fixed versions 1.37.1, 1.36.5, 1.35.8, or 1.34.13 as soon as possible to eliminate the vulnerability. In environments where immediate upgrade is not feasible, consider deploying network-level protections such as HTTP/2 frame inspection and rate limiting to detect and block suspicious or malformed DATA frames arriving immediately after stream resets. Implement robust monitoring and alerting on Envoy proxy logs and metrics to detect abnormal crashes or restarts that may indicate exploitation attempts. Use canary or staged deployments to validate the stability of the patched versions before full rollout. Additionally, review and harden HTTP/2 traffic handling policies and consider isolating critical Envoy instances behind additional layers of defense to reduce exposure. Regularly audit and update all proxy and service mesh components to maintain security posture.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-13T16:27:51.806Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b071392f860ef943a5fd5d
Added to database: 3/10/2026, 7:30:01 PM
Last enriched: 3/10/2026, 7:45:11 PM
Last updated: 3/10/2026, 8:30:44 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.