Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/envoyproxy/envoy/commit/da56f6da63079baecef9183436ee5f4141a59af8 | Patch |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f | Exploit Third Party Advisory |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Sep 2025, 14:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | |
First Time |
Envoyproxy envoy
Envoyproxy |
|
References | () https://github.com/envoyproxy/envoy/commit/da56f6da63079baecef9183436ee5f4141a59af8 - Patch | |
References | () https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f - Exploit, Third Party Advisory |
18 Dec 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-18 20:15
Updated : 2025-09-04 14:03
NVD link : CVE-2024-53271
Mitre link : CVE-2024-53271
CVE.ORG link : CVE-2024-53271
JSON object : View
Products Affected
envoyproxy
- envoy
CWE
CWE-670
Always-Incorrect Control Flow Implementation