Search for vulnerabilities
Vulnerability ID | VCID-h5gd-ykr6-aaag |
Aliases |
CVE-2023-35942
|
Summary | Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 5.9 |
Risk | 3.0 |
Affected and Fixed Packages | Package Details |
CWE-416 | Use After Free |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35942.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2023-35942 | ||
https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4 | ||
2217978 | https://bugzilla.redhat.com/show_bug.cgi?id=2217978 | |
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | |
CVE-2023-35942 | https://nvd.nist.gov/vuln/detail/CVE-2023-35942 | |
ISTIO-SECURITY-2023-003 | https://istio.io/latest/news/security/ISTIO-SECURITY-2023-003/ | |
RHSA-2023:4624 | https://access.redhat.com/errata/RHSA-2023:4624 | |
RHSA-2023:5174 | https://access.redhat.com/errata/RHSA-2023:5174 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.0236 |
EPSS Score | 0.00016 |
Published At | May 8, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |