Looking for the vulnerability index of Invicti's legacy products?
Envoy Proxy Detection of Error Condition Without Action Vulnerability - CVE-2024-30255 - Vulnerability Database

Envoy Proxy Detection of Error Condition Without Action Vulnerability - CVE-2024-30255

High
Reference: CVE-2024-30255
Title: Envoy Proxy Detection of Error Condition Without Action Vulnerability
Overview:

Envoy is a cloud-native open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3 1.28.2 1.27.4 and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy39s HTTP/2 codec allows the client to send an unlimited number of CONTINUATION frames even after exceeding Envoy39s header map limits. This allows an attacker to send a sequence of CONTINUATION frames without the END_HEADERS bit set causing CPU utilization consuming approximately 1 core per 300Mbit/s of traffic and culminating in denial of service through CPU exhaustion. Users should upgrade to version 1.29.3 1.28.2 1.27.4 or 1.26.8 to mitigate the effects of the CONTINUATION flood. As a workaround disable HTTP/2 protocol for downstream connections.