First published: Wed Mar 24 2021(Updated: )
An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/envoyproxy/envoy | <1.17.2 | 1.17.2 |
Envoy Proxy | =1.16.2 | |
Envoy Proxy | =1.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28683 is a vulnerability in Envoy that allows remote attackers to cause a NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.
CVE-2021-28683 has a severity rating of 7.5 (high).
Envoy versions 1.16.2 and 1.17.1 are affected by CVE-2021-28683.
To fix CVE-2021-28683, update to Envoy version 1.17.2 or later.
You can find more information about CVE-2021-28683 on the Envoy blog, Envoy GitHub releases page, and Envoy GitHub security advisories page.