CVE-2026-26310
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
10/03/2026
Last modified:
11/03/2026
Description
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | 1.34.13 (excluding) | |
| cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | 1.35.0 (including) | 1.35.8 (excluding) |
| cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | 1.36.0 (including) | 1.36.5 (excluding) |
| cpe:2.3:a:envoyproxy:envoy:1.37.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



