The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade envoyproxy/envoy
to version 1.29.9, 1.30.6, 1.31.2 or higher.
Affected versions of this package are vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer due to the improper handling of clearRouteCache
when remote JWKs are used, which requires asynchronous header processing. An attacker can trigger a crash in the upstream code by exploiting the ordering of continueDecoding
and clearRouteCache
under specific conditions.
Note:
This is only exploitable if remote JWKs are used, clear_route_cache
is enabled on the provider, header operations are enabled in JWT filter, and the routing table is configured in a way that the JWT header operations modify requests to not match any route.