CVE-2024-53271

Published: Dic 18, 2024 Last Modified: Set 04, 2025 EU-VD ID: EUVD-2024-51926
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,1
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: high

Description

AI Translation Available

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0001
Percentile
0,0th
Updated

EPSS Score Trend (Last 90 Days)

670

Always-Incorrect Control Flow Implementation

Draft
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Other Alter Execution Logic
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Envoy by Envoyproxy

Version Range Affected
From 1.31.0 (inclusive)
To 1.31.5 (exclusive)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Envoy by Envoyproxy

Version Range Affected
From 1.32.0 (inclusive)
To 1.32.3 (inclusive)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f
https://github.com/envoyproxy/envoy/commit/da56f6da63079baecef9183436ee5f4141a5…
https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f