Improper Null Termination Affecting envoyproxy/envoy package, versions [1.8.0, 1.33.13)[1.34.0, 1.34.11)[1.35.0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ENVOYPROXYENVOY-14176103
  • published4 Dec 2025
  • disclosed3 Dec 2025
  • creditmarkevich.nikita1

Introduced: 3 Dec 2025

NewCVE-2025-66220  (opens in a new tab)
CWE-170  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Improper Null Termination in Utility::generalNameAsString. An attacker can bypass certificate validation by presenting a certificate containing an embedded null byte in the OTHERNAME SAN value.

Notes:

  • Exploitation of this vulnerability requires Envoy to be set with require_client_certificate as true and a match_typed_subject_alt_names entry for the OTHERNAME OID with matcher.exact.
  • The fix for this vulnerability should also be included in v1.35.7 and v1.36.3; however, at the time of updating this advisory, those were not released yet.

CVSS Base Scores

version 4.0
version 3.1