Impact
The vulnerability is a logic flaw in Envoy's HTTP connection manager that allows a zombie stream filter to be executed after the stream has been reset and cleaned up, resulting in a use‑after‑free that can crash the Envoy process. The flaw arises when a DATA frame is received immediately after the reset and the Connection Manager does not guard against calling decodeData on filters that have already been destroyed. This can lead to application crashes and service disruption.
Affected Systems
The affected product is Envoy by envoyproxy. Versions prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13 contain the flaw. Systems running any of these releases are vulnerable until they are upgraded. This applies to all commonly used builds of Envoy, either as a standalone proxy or embedded in service meshes.
Risk and Exploitability
The CVSS score of 5.9 indicates a medium impact, and the EPSS score of less than 1% suggests an extremely low probability of exploitation at the current time. Based on the description, it is inferred that the likely attack vector is network‑based, requiring an attacker to inject HTTP/2 traffic to trigger the issue. The vulnerability is not listed in CISA's KEV catalogue, indicating no publicly known exploitation yet.
OpenCVE Enrichment
Github GHSA