CVE-2024-23324
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/02/2024
Last modified:
15/02/2024
Description
Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | 1.26.0 (including) | 1.26.7 (excluding) |
| cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | 1.27.0 (including) | 1.27.3 (excluding) |
| cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | 1.28.0 (including) | 1.28.1 (excluding) |
| cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | 1.29.0 (including) | 1.29.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



