First published: Wed Dec 18 2024(Updated: )
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | <1.31.5<1.32.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53271 is considered a critical vulnerability due to its potential to cause downstream failures in networked devices.
To mitigate CVE-2024-53271, upgrade Envoy Proxy to versions 1.31.5 or 1.32.3 or later.
CVE-2024-53271 affects Envoy Proxy versions prior to 1.31.5 and 1.32.3.
CVE-2024-53271 impacts the handling of HTTP/1.1 non-101 1xx responses, leading to potential failures.
Currently, the recommended solution for CVE-2024-53271 is to upgrade to the fixed versions, as there are no stated workarounds.