| Vulnerability Name: | CVE-2021-32778 (CCN-208236) | ||||||||||||
| Assigned: | 2021-08-24 | ||||||||||||
| Published: | 2021-08-24 | ||||||||||||
| Updated: | 2022-06-15 | ||||||||||||
| Summary: | Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy’s procedure for resetting a HTTP/2 stream has O(N^2) complexity, leading to high CPU utilization when a large number of streams are reset. Deployments are susceptible to Denial of Service when Envoy is configured with high limit on H/2 concurrent streams. An attacker wishing to exploit this vulnerability would require a client opening and closing a large number of H/2 streams. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to reduce time complexity of resetting HTTP/2 streams. As a workaround users may limit the number of simultaneous HTTP/2 dreams for upstream and downstream peers to a low number, i.e. 100. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-834 | ||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-32778 Source: XF Type: UNKNOWN envoy-cve202132778-dos(208236) Source: CCN Type: Envoy GIT Repository Excessive CPU utilization when closing HTTP/2 streams Source: CONFIRM Type: Third Party Advisory https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc Source: MISC Type: Release Notes, Vendor Advisory https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-32778 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||