Description
Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited number of CONTINUATION frames even after exceeding Envoy's header map limits. This allows an attacker to send a sequence of CONTINUATION frames without the END_HEADERS bit set causing CPU utilization, consuming approximately 1 core per 300Mbit/s of traffic and culminating in denial of service through CPU exhaustion. Users should upgrade to version 1.29.3, 1.28.2, 1.27.4, or 1.26.8 to mitigate the effects of the CONTINUATION flood. As a workaround, disable HTTP/2 protocol for downstream connections.
Published: 2024-04-04
Score: 5.3 Medium
EPSS: 88.8% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 14 Feb 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Envoyproxy
Envoyproxy envoy
CPEs cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
Vendors & Products Envoyproxy
Envoyproxy envoy
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat service Mesh
CPEs cpe:/a:redhat:service_mesh:2.5::el8
Vendors & Products Redhat service Mesh

Subscriptions

Envoyproxy Envoy
Redhat Rhmt Service Mesh
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-04T18:30:33.889Z

Reserved: 2024-03-26T12:52:00.934Z

Link: CVE-2024-30255

cve-icon Vulnrichment

Updated: 2024-08-02T01:32:05.423Z

cve-icon NVD

Status : Modified

Published: 2024-04-04T20:15:08.983

Modified: 2025-11-04T19:17:06.190

Link: CVE-2024-30255

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-04-03T00:00:00Z

Links: CVE-2024-30255 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses