First published: Fri Feb 09 2024(Updated: )
Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | >=1.26.0<1.26.7 | |
Envoy Proxy | >=1.27.0<1.27.3 | |
Envoy Proxy | >=1.28.0<1.28.1 | |
Envoy Proxy | >=1.29.0<1.29.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23323 is considered a moderate severity vulnerability due to its impact on CPU usage and request latency.
To fix CVE-2024-23323, upgrade Envoy Proxy to version 1.29.1, 1.28.1, 1.27.4, or later.
CVE-2024-23323 affects Envoy versions between 1.26.0 and 1.26.7, 1.27.0 and 1.27.3, 1.28.0 and 1.28.1, and 1.29.0 and 1.29.1.
The implications of CVE-2024-23323 include potential increased CPU usage and latency for requests depending on regex matchers in configured routes.
Currently, the best approach for CVE-2024-23323 is to apply the recommended updates as there are no specific workarounds mentioned.