CVE-2024-53271

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

04 Sep 2025, 14:03

Type Values Removed Values Added
CPE cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
First Time Envoyproxy envoy
Envoyproxy
References () https://github.com/envoyproxy/envoy/commit/da56f6da63079baecef9183436ee5f4141a59af8 - () https://github.com/envoyproxy/envoy/commit/da56f6da63079baecef9183436ee5f4141a59af8 - Patch
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f - () https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f - Exploit, Third Party Advisory

18 Dec 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-18 20:15

Updated : 2025-09-04 14:03


NVD link : CVE-2024-53271

Mitre link : CVE-2024-53271

CVE.ORG link : CVE-2024-53271


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-670

Always-Incorrect Control Flow Implementation