CVE-2024-30255

MEDIUM

Envoy < 1.26.8 - Denial of Service

Title source: rule

Description

Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited number of CONTINUATION frames even after exceeding Envoy's header map limits. This allows an attacker to send a sequence of CONTINUATION frames without the END_HEADERS bit set causing CPU utilization, consuming approximately 1 core per 300Mbit/s of traffic and culminating in denial of service through CPU exhaustion. Users should upgrade to version 1.29.3, 1.28.2, 1.27.4, or 1.26.8 to mitigate the effects of the CONTINUATION flood. As a workaround, disable HTTP/2 protocol for downstream connections.

Exploits (2)

github WORKING POC 15 stars
by lockness-Ko · gopoc
https://github.com/lockness-Ko/CVE-2024-27316
nomisec WORKING POC 3 stars
by blackmagic2023 · poc
https://github.com/blackmagic2023/Envoy-CPU-Exhaustion-Vulnerability-PoC

Scores

CVSS v3 5.3
EPSS 0.8881
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Classification

CWE
CWE-390
Status published

Affected Products (1)

envoyproxy/envoy < 1.26.8

Timeline

Published Apr 04, 2024
Tracked Since Feb 18, 2026