CVE-2026-26310

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:1.37.0:*:*:*:*:*:*:*

History

11 Mar 2026, 16:09

Type Values Removed Values Added
CPE cpe:2.3:a:envoyproxy:envoy:1.37.0:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
First Time Envoyproxy
Envoyproxy envoy
CWE NVD-CWE-noinfo
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-3cw6-2j68-868p - () https://github.com/envoyproxy/envoy/security/advisories/GHSA-3cw6-2j68-868p - Exploit, Vendor Advisory

11 Mar 2026, 13:53

Type Values Removed Values Added
Summary
  • (es) Envoy es un proxy de alto rendimiento de borde/intermedio/servicio. Antes de 1.37.1, 1.36.5, 1.35.8 y 1.34.13, llamar a Utility::getAddressWithPort con direcciones IPv6 con ámbito causa un fallo. Esta utilidad es llamada en el plano de datos desde el filtro original_src y el filtro dns. Esta vulnerabilidad está corregida en 1.37.1, 1.36.5, 1.35.8 y 1.34.13.

10 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-10 20:16

Updated : 2026-03-11 16:09


NVD link : CVE-2026-26310

Mitre link : CVE-2026-26310

CVE.ORG link : CVE-2026-26310


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo