CVE-2024-23324

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/02/2024
Last modified:
15/02/2024

Description

Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.<br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* 1.26.0 (including) 1.26.7 (excluding)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* 1.27.0 (including) 1.27.3 (excluding)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* 1.28.0 (including) 1.28.1 (excluding)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* 1.29.0 (including) 1.29.1 (excluding)