First published: Tue Jan 21 2025(Updated: )
A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Service Mesh | >=2.5.6<=2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0752 poses risks such as rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and potential replay attacks.
CVE-2025-0752 affects Red Hat OpenShift Service Mesh versions 2.6.3 and 2.5.6.
Mitigation for CVE-2025-0752 involves implementing proper HTTP header sanitization and monitoring for unusual traffic patterns.
There is currently no specific patch provided for CVE-2025-0752, but it is advisable to update to the latest version of the affected software.
CVE-2025-0752 can lead to significant system performance issues, including potential CPU and memory exhaustion.