← Back to CVEs
CVE-2020-35470
HIGH8.8
Description
Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/15/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
envoyproxy:envoy
References
https://github.com/envoyproxy/envoy/issues/14087(cve@mitre.org)
https://github.com/envoyproxy/envoy/pull/14131(cve@mitre.org)
https://github.com/envoyproxy/envoy/compare/v1.16.0...v1.16.1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/envoyproxy/envoy/issues/14087(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/envoyproxy/envoy/pull/14131(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.