Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited number of CONTINUATION frames even after exceeding Envoy's header map limits. This allows an attacker to send a sequence of CONTINUATION frames without the END_HEADERS bit set causing CPU utilization, consuming approximately 1 core per 300Mbit/s of traffic and culminating in denial of service through CPU exhaustion. Users should upgrade to version 1.29.3, 1.28.2, 1.27.4, or 1.26.8 to mitigate the effects of the CONTINUATION flood. As a workaround, disable HTTP/2 protocol for downstream connections.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Feb 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Envoyproxy
Envoyproxy envoy |
|
| CPEs | cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Envoyproxy
Envoyproxy envoy |
|
| Metrics |
ssvc
|
Tue, 08 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat service Mesh
|
|
| CPEs | cpe:/a:redhat:service_mesh:2.5::el8 | |
| Vendors & Products |
Redhat service Mesh
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-04T18:30:33.889Z
Reserved: 2024-03-26T12:52:00.934Z
Link: CVE-2024-30255
Updated: 2024-08-02T01:32:05.423Z
Status : Modified
Published: 2024-04-04T20:15:08.983
Modified: 2025-11-04T19:17:06.190
Link: CVE-2024-30255
OpenCVE Enrichment
No data.
Weaknesses