ISTIO-SECURITY-2024-006

CVEs reported by Envoy.

Sep 19, 2024

Disclosure Details
CVE(s)CVE-2024-45807
CVE-2024-45808
CVE-2024-45806
CVE-2024-45809
CVE-2024-45810
CVSS Impact Score7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Releases1.22.0 to 1.22.4
1.23.0 to 1.23.1

CVE

Envoy CVEs

Am I Impacted?

You are impacted if you are using Istio 1.22.0 to 1.22.4 or 1.23.0 to 1.23.1.

If you deploy an Istio Ingress Gateway, you are potentially vulnerable to x-envoy header manipulation by external sources. Envoy previously considered all private IP to be internal by default and as a result, did not sanitize headers from external sources with private IPs. Envoy added support for the flag envoy.reloadable_features.explicit_internal_address_config to explicitly un-trust all IPs. Envoy and Istio currently disable the flag by default for backwards compatibility. In future Envoy and Istio release the flag envoy.reloadable_features.explicit_internal_address_config will be enabled by default. The Envoy flag can be set mesh-wide or per-proxy via the ProxyConfig in runtimeValues.

Mesh-wide example configuration:

meshConfig:
  defaultConfig:
    runtimeValues:
      "envoy.reloadable_features.explicit_internal_address_config": "true"

Per-proxy example configuration:

annotations:
  proxy.istio.io/config: |
    runtimeValues:
      "envoy.reloadable_features.explicit_internal_address_config": "true"

Note fields in ProxyConfig are not dynamically configured; changes will require restart of workloads to take effect.