<?xml version="1.0" encoding="UTF-8"?>

<!-- AUTOGENERATED FILE. DO NOT EDIT. -->

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:cloud-service-mesh-security-bulletins</id>
  <title>Cloud Service Mesh - Security Bulletins</title>
  <link rel="self" href="https://docs.cloud.google.com/feeds/cloud-service-mesh-security-bulletins.xml"/>
  <author>
    <name>Google Cloud Documentation</name>
  </author>
  <updated>2026-03-11T07:04:33.951765+00:00</updated>


  <entry>
    <title>GCP-2026-013</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2026-013</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2026-013"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2026-03-11</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Fixes multivalue header bypass in RBAC.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          All Cloud Service Mesh versions are impacted by this CVE.
         </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.28.5-asm.9</li>
<li>1.27.8-asm.7</li>
<li>1.26.8-asm.3</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.25 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.26 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, follow the instructions in the MSA. All
            versions remain supported and your system will be automatically updated over the coming
            weeks.
           </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26308">CVE-2026-26308</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Fixes an off-by-one write that could corrupt the string null terminator.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_1" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          All Cloud Service Mesh versions are impacted by this CVE.
         </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.28.5-asm.9</li>
<li>1.27.8-asm.7</li>
<li>1.26.8-asm.3</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.25 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.26 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, follow the instructions in the MSA. All
            versions remain supported and your system will be automatically updated over the coming
            weeks.
           </p>
</td>
<td><p>Moderate</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26309">CVE-2026-26309</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Fixes crash in `getAddressWithPort() when called with a scoped IPv6 address.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_2" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          All Cloud Service Mesh versions are impacted by this CVE.
         </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.28.5-asm.9</li>
<li>1.27.8-asm.7</li>
<li>1.26.8-asm.3</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.25 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.26 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, follow the instructions in the MSA. All
            versions remain supported and your system will be automatically updated over the coming
            weeks.
           </p>
</td>
<td><p>Moderate</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26310">CVE-2026-26310</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Ensures decode* methods are blocked after a downstream reset.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_3" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          All Cloud Service Mesh versions are impacted by this CVE.
         </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.28.5-asm.9</li>
<li>1.27.8-asm.7</li>
<li>1.26.8-asm.3</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.25 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.26 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, follow the instructions in the MSA. All
            versions remain supported and your system will be automatically updated over the coming
            weeks.
           </p>
</td>
<td><p>Moderate</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26311">CVE-2026-26311</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Fixes a bug where response phase limit may result in crash.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_4" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          Only in-cluster Cloud Service Mesh version 1.28 is impacted by this CVE.
         </p>
<p>This CVE does not affect Cloud Service Mesh with a managed control plane.</p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one the following patched
          version: 1.28.5-asm.9
          </p>
<p>
            For <b>managed</b> Cloud Service Mesh, no action is required. This CVE does not
            affect Cloud Service Mesh with a managed control plane.
           </p>
</td>
<td><p>Moderate</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26330">CVE-2026-26330</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Fixes JSON Web Key Set private key leakage vulnerability.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_5" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          All Cloud Service Mesh versions are impacted by this CVE.
         </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.28.5-asm.9</li>
<li>1.27.8-asm.7</li>
<li>1.26.8-asm.3</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.25 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.26 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, follow the instructions in the MSA. All
            versions remain supported and your system will be automatically updated over the coming
            weeks.
           </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31837">CVE-2026-31837</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Fixes a bug where debug Endpoints Allow Cross-Namespace Proxy Data Access
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_6" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          Only in-cluster Cloud Service Mesh versions 1.27 and 1.28 are impacted by this CVE.
         </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.28.5-asm.9</li>
<li>1.27.8-asm.7</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.25 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.26 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, no action is required. This CVE does not
            affect Cloud Service Mesh with a managed control plane.
           </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31838">CVE-2026-31838</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-073</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2025-073</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2025-073"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2025-12-03</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         TLS certificate matcher for <code dir="ltr" translate="no">match_typed_subject_alt_names</code> may incorrectly
         treat certificates containing an embedded null byte.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_7" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          Your cluster is impacted if it uses an in-cluster Cloud Service Mesh patch version
          earlier than:
         </p>
<ul>
<li>1.27.4-asm.1</li>
<li>1.26.7-asm.1</li>
<li>1.25.6-asm.1</li>
</ul>
<p>This CVE does not affect Cloud Service Mesh with a managed control plane. </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, Upgrade your cluster to one of the following patched versions:
          </p>
<ul>
<li>1.27.4-asm.1</li>
<li>1.26.7-asm.1</li>
<li>1.25.6-asm.1</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.24 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.25 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, no action is required. This CVE does not affect
            Cloud Service Mesh with a managed control plane.
           </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-CVE-2025-66220">CVE-2025-66220</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Envoy crashes when JWT authentication is configured with the remote JWKS fetching.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_8" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          Your cluster is impacted if it uses an in-cluster Cloud Service Mesh patch version
          earlier than:
         </p>
<ul>
<li>1.27.4-asm.1</li>
<li>1.26.7-asm.1</li>
<li>1.25.6-asm.1</li>
</ul>
<p>Your cluster is impacted if it uses a managed Cloud Service Mesh version earlier than:</p>
<ul>
<li>1.21.6-asm.7</li>
<li>1.20.8-asm.59</li>
<li>1.19.10-asm.54</li>
</ul>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.27.4-asm.1</li>
<li>1.26.7-asm.1</li>
<li>1.25.6-asm.1</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.24 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.25 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, please follow the instructions in the MSA. All versions remain
            supported and your system will be automatically updated over the coming weeks.
           </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64527">CVE-2025-64527</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Potential request smuggling from early data after the <code dir="ltr" translate="no">CONNECT</code> upgrade.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_9" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
          Your cluster is impacted if it uses an in-cluster Cloud Service Mesh patch version
          earlier than:
         </p>
<ul>
<li>1.27.4-asm.1</li>
<li>1.26.7-asm.1</li>
<li>1.25.6-asm.1</li>
</ul>
<p>This CVE does not affect Cloud Service Mesh with a managed control plane. </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following patched versions:
          </p>
<ul>
<li>1.27.4-asm.1</li>
<li>1.26.7-asm.1</li>
<li>1.25.6-asm.1</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.24 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. Upgrade to
            version 1.25 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, no action is required. This CVE does not affect
            Cloud Service Mesh with a managed control plane.
           </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-CVE-2025-64763">CVE-2025-64763</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-064</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2025-064</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2025-064"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2025-10-28</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Lua filters may crash Envoy when handling a large response body.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_10" tabindex="-1">What should I do?</h4>
<strong>Check whether your clusters are impacted:</strong>
<p>Your cluster is impacted if your patch versions are earlier than:</p>
<ul>
<li>1.27.2-asm.1</li>
<li>1.26.5-asm.1</li>
<li>1.25.5-asm.9</li>
</ul>
<p>
          If you're using Cloud Service Mesh v1.24 or earlier, your release has reached end of life
          and is no longer supported. These CVE fixes have not been backported. Upgrade to version
          1.25 or later.
          </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.27.2-asm.1</li>
<li>1.26.5-asm.1</li>
<li>1.25.5-asm.9</li>
</ul>
<p>
            For <b>managed</b> Cloud Service Mesh, no action is required. All versions remain
            supported and your system will be automatically updated over the coming weeks.
          </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62504">CVE-2025-62504</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Large requests or responses may crash the TCP connection pool.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_11" tabindex="-1">What should I do?</h4>
<strong>Check whether your clusters are impacted:</strong>
<p>Your cluster is impacted if your patch versions are earlier than:</p>
<ul>
<li>1.27.2-asm.1</li>
<li>1.26.5-asm.1</li>
<li>1.25.5-asm.9</li>
</ul>
<p>
          If you're using Cloud Service Mesh v1.24 or earlier, your release has reached end of life
          and is no longer supported. These CVE fixes have not been backported. Upgrade to version
          1.25 or later.
          </p>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.27.2-asm.1</li>
<li>1.26.5-asm.1</li>
<li>1.25.5-asm.9</li>
</ul>
<p>
            For <b>managed</b> Cloud Service Mesh, no action is required. All versions remain
            supported and your system will be automatically updated over the coming weeks.
          </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62409">CVE-2025-62409</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2025-048</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2025-048</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2025-048"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2025-09-02</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Use after free in DNS cache.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_12" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Only clusters running in-cluster Cloud Service Mesh version 1.26 are affected.</p>
<p>
<strong>If you are running a managed Cloud Service Mesh, you are not affected and do
           not need to take any action.</strong>
</p>
<strong>Mitigation</strong>
<p>
         If you are running in-cluster Cloud Service Mesh 1.26,
         <a href="https://docs.cloud.google.com/service-mesh/docs/upgrade/upgrade">upgrade any affected clusters</a> to 1.26.4-asm.1.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54588">CVE-2025-54588</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2024-065</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2024-065</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2024-065"/>
    <content type="html"><![CDATA[<table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Happy Eyeballs: Validate that additional_address are IP addresses instead of crashing when sorting.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_13" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if patch versions earlier than:</p>
<ul>
<li>1.23.4-asm.1</li>
<li>1.22.7-asm.1</li>
</ul>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, Upgrade your cluster to one of the following patched versions:
          </p>
<ul>
<li>1.23.4-asm.1</li>
<li>1.22.7-asm.1</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.20 or earlier, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. You should
            upgrade to version 1.21 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, no action is required. All versions remain
            supported and your system will be automatically updated over the coming weeks.
           </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53269">CVE-2024-53269</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         HTTP/1: Sending overload crashes when the request is reset beforehand.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_14" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if patch versions earlier than:</p>
<ul>
<li>1.23.4-asm.1</li>
<li>1.22.7-asm.1</li>
<li>1.21.5-asm.17</li>
<li>1.20.8-asm.14</li>
<li>1.19.10-asm.24</li>
</ul>
<strong>Mitigation</strong>
<p>
          For <b>in-cluster</b> Cloud Service Mesh, Upgrade your cluster to one of the following
          patched versions:
          </p>
<ul>
<li>1.23.4-asm.1</li>
<li>1.22.7-asm.1</li>
<li>1.21.5-asm.17</li>
</ul>
<p>
            If you're using Cloud Service Mesh v1.20 or earlier, your release has reached end of
            life and is no longer supported. If you're using Cloud Service Mesh v1.20 or earlier, your
            release has reached end of life and is no longer supported. These CVE fixes have not been
            backported. You should upgrade to version 1.21 or later.
           </p>
<p>
            For <b>managed</b> Cloud Service Mesh, no action is required. All versions remain
            supported and your system will be automatically updated over the coming weeks.
           </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53270">CVE-2024-53270</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         HTTP/1.1 Multiple issues with envoy.reloadable_features.http1_balsa_delay_reset.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_15" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if patch versions earlier than:</p>
<ul>
<li>1.23.4-asm.1</li>
</ul>
<strong>Mitigation</strong>
<p>
         For <b>in-cluster</b> Cloud Service Mesh, Upgrade your cluster to one of the following
         patched versions:
         </p>
<ul>
<li>1.23.4-asm.1</li>
</ul>
<p>
          If you're using Cloud Service Mesh v1.20 or earlier, your release has reached end of
          life and is no longer supported. If you're using Cloud Service Mesh v1.20 or earlier, your
          release has reached end of life and is no longer supported. These CVE fixes have not been
          backported. You should upgrade to version 1.21 or later.
         </p>
<p>
         For <b>managed</b> Cloud Service Mesh, no action is required. All versions remain
         supported and your system will be automatically updated over the coming weeks.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53271">CVE-2024-53271</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2024-052</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2024-052</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2024-052"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2024-09-19</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         oghttp2 crash on OnBeginHeadersForStream
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_16" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Only clusters running Cloud Service Mesh v1.23 are affected</p>
<strong>Mitigation</strong>
<p>
         Cloud Service Mesh 1.23.2-asm.2 contains the fix for this issue. No action is required.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45807">CVE-2024-45807</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Malicious log injection via access logs
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_17" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
          Upgrade your cluster to one of the following patched versions:
          </p>
<ul>
<li>1.20.8-asm.7</li>
<li>1.21.5-asm.7</li>
<li>1.22.5-asm.1</li>
<li>1.23.2-asm.2</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45808">CVE-2024-45808</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Potential to manipulate `x-envoy` headers from external sources
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_18" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
          Upgrade your cluster to one of the following patched versions:
          </p>
<ul>
<li>1.20.8-asm.7</li>
<li>1.21.5-asm.7</li>
<li>1.22.5-asm.1</li>
<li>1.23.2-asm.2</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45806">CVE-2024-45806</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         JWT filter crash in the clear route cache with remote JWKs
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_19" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
          Upgrade your cluster to one of the following patched versions:
          </p>
<ul>
<li>1.20.8-asm.7</li>
<li>1.21.5-asm.7</li>
<li>1.22.5-asm.1</li>
<li>1.23.2-asm.2</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45809">CVE-2024-45809</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Envoy crashes for LocalReply in http async client
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_20" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
          Upgrade your cluster to one of the following patched versions:
          </p>
<ul>
<li>1.20.8-asm.7</li>
<li>1.21.5-asm.7</li>
<li>1.22.5-asm.1</li>
<li>1.23.2-asm.2</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45810">CVE-2024-45810</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2024-032</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2024-032</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2024-032"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2024-06-24</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Envoy incorrectly accepts HTTP 200 response for entering upgrade mode.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_21" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
         If you are running managed Cloud Service Mesh, your system will be automatically updated
         over the coming days.
         </p>
<p>
         Otherwise, upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>v1.21.3-asm.3</li>
<li>v1.20.7-asm.2</li>
<li>v1.19.10-asm.6</li>
<li>v1.18.7-asm.26</li>
<li>If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.18 or above.</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23326">CVE-2024-23326</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Crash in EnvoyQuicServerStream::OnInitialHeadersComplete().
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_22" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
         If you are running managed Cloud Service Mesh, your system will be automatically updated
         over the coming days.
         </p>
<p>
         Otherwise, upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>v1.21.3-asm.3</li>
<li>v1.20.7-asm.2</li>
<li>v1.19.10-asm.6</li>
<li>v1.18.7-asm.26</li>
<li>If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.18 or above.</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32974">CVE-2024-32974</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Crash in QuicheDataReader::PeekVarInt62Length().
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_23" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
         If you are running managed Cloud Service Mesh, your system will be automatically updated
         over the coming days.
         </p>
<p>
          Otherwise, upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>v1.21.3-asm.3</li>
<li>v1.20.7-asm.2</li>
<li>v1.19.10-asm.6</li>
<li>v1.18.7-asm.26</li>
<li>If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.18 or above.</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32975">CVE-2024-32975</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Endless loop while decompressing Brotli data with extra input.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_24" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
         If you are running managed Cloud Service Mesh, your system will be automatically updated
         over the coming days.
         </p>
<p>
          Otherwise, upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>v1.21.3-asm.3</li>
<li>v1.20.7-asm.2</li>
<li>v1.19.10-asm.6</li>
<li>v1.18.7-asm.26</li>
<li>If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.18 or above.</li>
</ul>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32976">CVE-2024-32976</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Crash (use-after-free) in EnvoyQuicServerStream.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_25" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
         If you are running managed Cloud Service Mesh, your system will be automatically updated
         over the coming days.
         </p>
<p>
          Otherwise, upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>v1.21.3-asm.3</li>
<li>v1.20.7-asm.2</li>
<li>v1.19.10-asm.6</li>
<li>v1.18.7-asm.26</li>
<li>If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.18 or above.</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34362">CVE-2024-34362</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Crash due to uncaught nlohmann JSON exception.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_26" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
         If you are running managed Cloud Service Mesh, your system will be automatically updated
         over the coming days.
         </p>
<p>
          Otherwise, upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>v1.21.3-asm.3</li>
<li>v1.20.7-asm.2</li>
<li>v1.19.10-asm.6</li>
<li>v1.18.7-asm.26</li>
<li>If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.18 or above.</li>
</ul>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34363">CVE-2024-34363</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Envoy OOM vector from HTTP async client with unbounded response buffer for mirror response.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_27" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
         If you are running managed Cloud Service Mesh, your system will be automatically updated
         over the coming days.
         </p>
<p>
          Otherwise, upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>v1.21.3-asm.3</li>
<li>v1.20.7-asm.2</li>
<li>v1.19.10-asm.6</li>
<li>v1.18.7-asm.26</li>
<li>If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.18 or above.</li>
</ul>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34364">CVE-2024-34364</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2024-023</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#GCP-2024-023</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#GCP-2024-023"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2024-04-24</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         HTTP/2: memory exhaustion due to CONTINUATION frame flood.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_28" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.6-asm.0</li>
<li>1.19.10-asm.0</li>
<li>1.18.7-asm.21</li>
</ul>
<p>
           If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and
           is no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh v1.18 or later.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27919">CVE-2024-27919</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         HTTP/2: CPU exhaustion due to CONTINUATION frame flood
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_29" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.6-asm.0</li>
<li>1.19.10-asm.0</li>
<li>1.18.7-asm.21</li>
</ul>
<p>
           If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and
           is no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh 1.18 or later.
         </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30255">CVE-2024-30255</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Abnormal termination when using <code dir="ltr" translate="no">auto_sni</code> with ':authority' header longer than 255 characters.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_30" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.6-asm.0</li>
<li>1.19.10-asm.0</li>
<li>1.18.7-asm.21</li>
</ul>
<p>
           If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life and is
           no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh 1.18 or above.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32475">CVE-2024-32475</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         HTTP/2 CONTINUATION frames can be utilized for DoS attacks.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_31" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<strong>Mitigation</strong>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.6-asm.0</li>
<li>1.19.10-asm.0</li>
<li>1.18.7-asm.21</li>
</ul>
<p>
          If you're using Cloud Service Mesh v1.17 or below, your release has reached end of life
          and is no longer supported. These CVE fixes have not been backported. You should upgrade
          to version v1.18 or later.
         </p>
</td>
<td><p>Not Provided</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288">CVE-2023-45288</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2024-007</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2024-007</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2024-007"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2024-02-08</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Envoy crashes when idle and requests per try timeout occur within the backoff interval.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_32" tabindex="-1">What should I do?</h4>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.3-asm.4</li>
<li>1.19.7-asm.3</li>
<li>1.18.7-asm.4</li>
<li>1.17.8-asm.20</li>
</ul>
<p>
           If you're using Anthos Service Mesh v1.17 or earlier, your release has reached end of
           life and is no longer supported. While these CVE fixes have been backported to 1.17, you
           should upgrade to 1.18 or later.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23322">CVE-2024-23322</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
          Excessive CPU usage when URI template matcher is configured using regex.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_33" tabindex="-1">What should I do?</h4>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.3-asm.4</li>
<li>1.19.7-asm.3</li>
<li>1.18.7-asm.4</li>
<li>1.17.8-asm.20</li>
</ul>
<p>
           If you're using Anthos Service Mesh v1.17 or earlier, your release has reached end of
           life and is no longer supported. While these CVE fixes have been backported to 1.17, you
           should upgrade to 1.18 or later.
         </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23323">CVE-2024-23323</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         External authorization can be bypassed when Proxy protocol filter sets invalid UTF-8 metadata.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_34" tabindex="-1">What should I do?</h4>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.3-asm.4</li>
<li>1.19.7-asm.3</li>
<li>1.18.7-asm.4</li>
<li>1.17.8-asm.20</li>
</ul>
<p>
           If you're using Anthos Service Mesh v1.17 or earlier, your release has reached end of
           life and is no longer supported. While these CVE fixes have been backported to 1.17, you
           should upgrade to 1.18 or later.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23324">CVE-2024-23324</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Envoy crashes when using an address type that isn't supported by the OS.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_35" tabindex="-1">What should I do?</h4>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.3-asm.4</li>
<li>1.19.7-asm.3</li>
<li>1.18.7-asm.4</li>
<li>1.17.8-asm.20</li>
</ul>
<p>
           If you're using Anthos Service Mesh v1.17 or earlier, your release has reached end of
           life and is no longer supported. While these CVE fixes have been backported to 1.17, you
           should upgrade to 1.18 or later.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23325">CVE-2024-23325</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Crash in proxy protocol when command type is <code dir="ltr" translate="no">LOCAL</code>.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_36" tabindex="-1">What should I do?</h4>
<p>
          If you are running managed Cloud Service Mesh, no action is required. Your system will be
          automatically updated over the coming days.
         </p>
<p>
          If you are running in-cluster Cloud Service Mesh, you must upgrade your cluster to one
          of the following patched versions:
          </p>
<ul>
<li>1.20.3-asm.4</li>
<li>1.19.7-asm.3</li>
<li>1.18.7-asm.4</li>
<li>1.17.8-asm.20</li>
</ul>
<p>
           If you're using Anthos Service Mesh v1.17 or earlier, your release has reached end of
           life and is no longer supported. While these CVE fixes have been backported to 1.17, you
           should upgrade to 1.18 or later.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23327">CVE-2024-23327</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2023-031</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2023-031</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2023-031"/>
    <content type="html"><![CDATA[<p><strong>Published:</strong> 2023-10-10</p><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         A denial of service attack can affect the data plane when using the HTTP/2 protocol.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_37" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than
          1.18.4, 1.17.7, or 1.16.7.</p>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.18.4-asm.0</li>
<li>1.17.7-asm.0</li>
<li>1.16.7-asm.10</li>
</ul>
<p>
            If you are running managed Cloud Service Mesh, your system will be automatically updated
            within the next few days.
         </p>
<p>
            If you're using Cloud Service Mesh v1.15 or below, your release has reached end of
            life and is no longer supported. These CVE fixes have not been backported. You should
            upgrade to v1.16 or above.
         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487">CVE-2023-44487</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2023-021</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2023-021</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2023-021"/>
    <content type="html"><![CDATA[<p><strong>Updated:</strong>2023-07-26</p><strong>Published: 2022-07-25</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         A malicious client is able to construct credentials with permanent validity in some specific scenarios.  For example, the combination of host and expiration time in the HMAC payload can be always valid in OAuth2 filter's HMAC check.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_38" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than</p>
<ul>
<li>1.17.4</li>
<li>1.16.6</li>
<li>1.15.7</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.17.5-asm.0</li>
<li>1.16.7-asm.0</li>
<li>1.15.7-asm.23</li>
</ul>
<p>
<strong>If you are running managed Cloud Service Mesh</strong>, your system will be automatically updated
          within the next few days.
         </p>
<p>

             If you're using Anthos Service Mesh 1.14 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to ASM 1.15 or above.

         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35941">CVE-2023-35941</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         gRPC access loggers using the listener's global scope can cause a use-after-free crash when the listener is drained.  This can be triggered by an LDS update with the same gRPC access log configuration.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_39" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than</p>
<ul>
<li>1.17.4</li>
<li>1.16.6</li>
<li>1.15.7</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.17.5-asm.0</li>
<li>1.16.7-asm.0</li>
<li>1.15.7-asm.23</li>
</ul>
<p>
<strong>If you are running managed Cloud Service Mesh</strong>, your system will be automatically updated
          within the next few days.
         </p>
<p>

             If you're using Anthos Service Mesh 1.14 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to ASM 1.15 or above.

         </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35942">CVE-2023-35942</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         If <code dir="ltr" translate="no">origin</code> header is configured to be removed with request_headers_to_remove: origin, CORS filter will segfault and crash Envoy.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_40" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than</p>
<ul>
<li>1.17.4</li>
<li>1.16.6</li>
<li>1.15.7</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.17.5-asm.0</li>
<li>1.16.7-asm.0</li>
<li>1.15.7-asm.23</li>
</ul>
<p>
<strong>If you are running managed Cloud Service Mesh</strong>, your system will be automatically updated
          within the next few days.
         </p>
<p>

             If you're using Anthos Service Mesh 1.14 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to ASM 1.15 or above.

         </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35943">CVE-2023-35943</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Attackers can send mixed scheme requests to bypass some scheme checks in Envoy.  For example, if a request with mixed scheme htTp is sent to the OAuth2 filter, it will fail the exact-match checks for http, and inform the remote endpoint the scheme is https, thus potentially bypassing OAuth2 checks specific to HTTP requests.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_41" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than</p>
<ul>
<li>1.17.4</li>
<li>1.16.6</li>
<li>1.15.7</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.17.5-asm.0</li>
<li>1.16.7-asm.0</li>
<li>1.15.7-asm.23</li>
</ul>
<p>
<strong>If you are running managed Cloud Service Mesh</strong>, your system will be automatically updated
          within the next few days.
         </p>
<p>

             If you're using Anthos Service Mesh 1.14 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to ASM 1.15 or above.

         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35944">CVE-2023-35944</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2023-019</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2023-019</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2023-019"/>
    <content type="html"><![CDATA[<table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
          A specifically crafted response from an untrusted upstream service can cause a denial of
          service through memory exhaustion.  This is caused by Envoy's HTTP/2 codec which may leak
          a header map and bookkeeping structures upon receiving RST_STREAM immediately followed by
           the GOAWAY frames from an upstream server.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_42" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than</p>
<ul>
<li>1.17.4</li>
<li>1.16.6</li>
<li>1.15.7</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.17.4-asm.2</li>
<li>1.16.6-asm.3</li>
<li>1.15.7-asm.21</li>
</ul>
<p>
<strong>If you are running managed Cloud Service Mesh</strong>, your system will be automatically updated
          within the next few days.
         </p>
<p>

             If you're using Anthos Service Mesh 1.14 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to ASM 1.15 or above.

         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35945">CVE-2023-35945</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2023-002</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2023-002</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2023-002"/>
    <content type="html"><![CDATA[<table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         If Envoy is running with the OAuth filter enabled exposed, a malicious actor could construct a request which would cause denial of service by crashing Envoy.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_43" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your clusters are impacted if they use Cloud Service Mesh patch versions earlier than:</p>
<ul>
<li>1.16.4</li>
<li>1.15.7</li>
<li>1.14.6</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.16.4-asm.2</li>
<li>1.15.7-asm.1</li>
<li>1.14.6-asm.11</li>
</ul>
<p>

             If you're using Cloud Service Mesh v1.13 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.14 or above.

         </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27496">CVE-2023-27496</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         The attacker can use this vulnerability to bypass auth checks when ext_authz is used.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_44" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your clusters are impacted if they use Cloud Service Mesh patch versions earlier than:</p>
<ul>
<li>1.16.4</li>
<li>1.15.7</li>
<li>1.14.6</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.16.4-asm.2</li>
<li>1.15.7-asm.1</li>
<li>1.14.6-asm.11</li>
</ul>
<p>

             If you're using Cloud Service Mesh v1.13 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh} 1.14 or above.

         </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27488">CVE-2023-27488</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Envoy configuration must also include an option to add request headers that were generated using inputs from the request, i.e. the peer certificate SAN.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_45" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your clusters are impacted if they use Cloud Service Mesh patch versions earlier than:</p>
<ul>
<li>1.16.4</li>
<li>1.15.7</li>
<li>1.14.6</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.16.4-asm.2</li>
<li>1.15.7-asm.1</li>
<li>1.14.6-asm.11</li>
</ul>
<p>
</p><p>

             If you're using Cloud Service Mesh v1.13 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.14 or above.

         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27493">CVE-2023-27493</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_46" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your clusters are impacted if they use Cloud Service Mesh patch versions earlier than:</p>
<ul>
<li>1.16.4</li>
<li>1.15.7</li>
<li>1.14.6</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.16.4-asm.2</li>
<li>1.15.7-asm.1</li>
<li>1.14.6-asm.11</li>
</ul>
<p>

             If you're using Cloud Service Mesh v1.13 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.14 or above.

         </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27492">CVE-2023-27492</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         Attackers can send specifically crafted HTTP/2 or HTTP/3 requests to trigger parsing errors on HTTP/1 upstream service.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_47" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your clusters are impacted if they use Cloud Service Mesh patch versions earlier than:</p>
<ul>
<li>1.16.4</li>
<li>1.15.7</li>
<li>1.14.6</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.16.4-asm.2</li>
<li>1.15.7-asm.1</li>
<li>1.14.6-asm.11</li>
</ul>
<p>

             If you're using Cloud Service Mesh v1.13 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.14 or above.

         </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27491">CVE-2023-27491</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
         The header x-envoy-original-path should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client.
         </p>
<h4 data-text="What should I do?" id="what-should-i-do_48" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your clusters are impacted if they use Cloud Service Mesh patch versions earlier than:</p>
<ul>
<li>1.16.4</li>
<li>1.15.7</li>
<li>1.14.6</li>
</ul>
<strong>Mitigation</strong>
<p>
         Upgrade your cluster to one of the following patched versions:
         </p>
<ul>
<li>1.16.4-asm.2</li>
<li>1.15.7-asm.1</li>
<li>1.14.6-asm.11</li>
</ul>
<p>

             If you're using Cloud Service Mesh v1.13 or below, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.14 or above.

         </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27487">CVE-2023-27487</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2022-020</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2022-020</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2022-020"/>
    <content type="html"><![CDATA[<strong>Published: 2022-10-05</strong><br/><strong>Updated: 2022-10-12</strong><br/><strong>2022-10-12 Update:</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       The Istio control plane <code dir="ltr" translate="no">istiod</code> is vulnerable to a request processing error, allowing a
       malicious attacker that sends a specially crafted message which results in the control plane
       crashing when the validating webhook for a cluster is exposed publicly. This endpoint is
       served over TLS port 15017, but does not require any authentication from the attacker.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_49" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than 1.14.4,
         1.13.8, or 1.12.9.</p>
<strong>Mitigation</strong>
<p>
<strong>If you are running standalone Cloud Service Mesh</strong>, upgrade your cluster to one of
       the following patched versions:
       </p>
<ul>
<li>If you're using Anthos Service Mesh 1.14, upgrade to v1.14.4-asm.2</li>
<li>If you're using Anthos Service Mesh 1.13, upgrade to v1.13.8-asm.4</li>
<li>If you're using Anthos Service Mesh 1.12, upgrade to v1.12.9-asm.3</li>
</ul>
<p>
<strong>If you are running managed Cloud Service Mesh</strong>, your system will be automatically
        updated within the next few days.
        </p>
<p>
       If you're using Cloud Service Mesh v1.11 or below, your release has reached end of life and is
       no longer supported. These CVE fixes have not been backported. You should upgrade to
       Cloud Service Mesh 1.12 or later.
       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/istio/istio/security/advisories/GHSA-86vr-4wcv-mm9w">CVE-2022-39278</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2022-015</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2022-015</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2022-015"/>
    <content type="html"><![CDATA[<strong>Published: 2022-06-09</strong><br/><strong>Updated: 2022-06-10</strong><br/><strong>2022-06-10 Update:</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Istio data plane can potentially access memory unsafely when the Metadata Exchange and Stats extensions are enabled.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_50" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
         Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than
         1.13.4-asm.4, 1.12.7-asm.2, or 1.11.8-asm.4.
       </p>
<strong>Cloud Service Mesh Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.13.4-asm.4</li>
<li>1.12.7-asm.2</li>
<li>1.11.8-asm.4</li>
</ul>
<p>

         If you're using Cloud Service Mesh v1.10 or earlier, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.11 or later.
         For more information, see <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-gke">Upgrading from earlier versions (GKE</a>
         or <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-on-prem">Upgrading from earlier versions (on-premises)</a>.

       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x">CVE-2022-31045</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Data can exceed intermediate buffer limits if a malicious attacker passes a small highly compressed payload (also known as a zip bomb attack).
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_51" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
         Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than
         1.13.4-asm.4, 1.12.7-asm.2, or 1.11.8-asm.4.
       </p>
<p>Although Cloud Service Mesh does not support Envoy filters, you could be impacted if you use a decompress filter.</p>
<strong>Cloud Service Mesh Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.13.4-asm.4</li>
<li>1.12.7-asm.2</li>
<li>1.11.8-asm.4</li>
</ul>
<p>

         If you're using Cloud Service Mesh v1.10 or earlier, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.11 or later.
         For more information, see <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-gke">Upgrading from earlier versions (GKE</a>
         or <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-on-prem">Upgrading from earlier versions (on-premises)</a>.
       </p>
<strong>Envoy Mitigation</strong>
<p>
       Envoy users managing their own Envoys should ensure that they are using Envoy release 1.22.1.
       Envoy users managing their own Envoys build the binaries from a source like GitHub and deploy
       them.</p>
<p>
       There's no action to be taken by users who run managed Envoys (Google Cloud provides
       the Envoy binaries), for which cloud products will switch to 1.22.1.
       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh">CVE-2022-29225</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Potential null pointer dereference in <code dir="ltr" translate="no">GrpcHealthCheckerImpl</code>.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_52" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
         Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than
         1.13.4-asm.4, 1.12.7-asm.2, or 1.11.8-asm.4.
       </p>
<strong>Cloud Service Mesh Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.13.4-asm.4</li>
<li>1.12.7-asm.2</li>
<li>1.11.8-asm.4</li>
</ul>
<p>

         If you're using Cloud Service Mesh v1.10 or earlier, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.11 or later.
         For more information, see <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-gke">Upgrading from earlier versions (GKE</a>
         or <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-on-prem">Upgrading from earlier versions (on-premises)</a>.
       </p>
<strong>Envoy Mitigation</strong>
<p>
       Envoy users managing their own Envoys should ensure that they are using Envoy release 1.22.1.
       Envoy users managing their own Envoys build the binaries from a source like GitHub and deploy
       them.</p>
<p>
       There's no action to be taken by users who run managed Envoys (Google Cloud provides
       the Envoy binaries), for which cloud products will switch to 1.22.1.
       </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49">CVE-2021-29224</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       OAuth filter allows trivial bypass.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_53" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
         Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than
         1.13.4-asm.4, 1.12.7-asm.2, or 1.11.8-asm.4.
       </p>
<p>Although Cloud Service Mesh does not support Envoy filters, you could be impacted if you use an OAuth filter.</p>
<strong>Cloud Service Mesh Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.13.4-asm.4</li>
<li>1.12.7-asm.2</li>
<li>1.11.8-asm.4</li>
</ul>
<p>

         If you're using Cloud Service Mesh v1.10 or earlier, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.11 or later.
         For more information, see <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-gke">Upgrading from earlier versions (GKE</a>
         or <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-on-prem">Upgrading from earlier versions (on-premises)</a>.
       </p>
<strong>Envoy Mitigation</strong>
<p>
       Envoy users managing their own Envoys also use the OAuth filter should ensure that they are
       using Envoy release 1.22.1. Envoy users managing their own Envoys build the binaries from a
       source like GitHub and deploy them.</p>
<p>
       There's no action to be taken by users who run managed Envoys (Google Cloud provides
       the Envoy binaries), for which cloud products will switch to 1.22.1.
       </p>
</td>
<td><p>Critical</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh">CVE-2021-29226</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       OAuth filter can corrupt memory (earlier versions) or trigger an ASSERT() (later versions).
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_54" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
         Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than
         1.13.4-asm.4, 1.12.7-asm.2, or 1.11.8-asm.4.
       </p>
<p>
       Although Cloud Service Mesh does not support Envoy filters, you could be impacted if you use an OAuth filter.
       </p>
<strong>Cloud Service Mesh Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.13.4-asm.4</li>
<li>1.12.7-asm.2</li>
<li>1.11.8-asm.4</li>
</ul>
<p>

           If you're using Cloud Service Mesh v1.10 or earlier, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.11 or later.

       </p>
<strong>Envoy Mitigation</strong>
<p>
       Envoy users managing their own Envoys also use the OAuth filter should ensure that they are
       using Envoy release 1.22.1. Envoy users managing their own Envoys build the binaries from a
       source like GitHub and deploy them.</p>
<p>
       There's no action to be taken by users who run managed Envoys (Google Cloud provides
       the Envoy binaries), for which cloud products will switch to 1.22.1.
       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6">CVE-2022-29228</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Internal redirects crash for requests with body or trailers.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_55" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
         Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than
         1.13.4-asm.4, 1.12.7-asm.2, or 1.11.8-asm.4.
       </p>
<strong>Cloud Service Mesh Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.13.4-asm.4</li>
<li>1.12.7-asm.2</li>
<li>1.11.8-asm.4</li>
</ul>
<p>

         If you're using Cloud Service Mesh v1.10 or earlier, your release has reached end of life and is no longer supported. These CVE fixes have not been backported. You should upgrade to Cloud Service Mesh 1.11 or later.
         For more information, see <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-gke">Upgrading from earlier versions (GKE</a>
         or <a href="https://cloud.google.com/service-mesh/docs/upgrade-path-old-versions-on-prem">Upgrading from earlier versions (on-premises)</a>.
       </p>
<strong>Envoy Mitigation</strong>
<p>
       Envoy users managing their own Envoys should ensure that they are using Envoy release 1.22.1.
       Envoy users managing their own Envoys build the binaries from a source like GitHub and deploy
       them.</p>
<p>
       There's no action to be taken by users who run managed Envoys (Google Cloud provides
       the Envoy binaries), for which cloud products will switch to 1.22.1.
       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-rm2p-qvf6-pvr6">CVE-2022-29227</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2022-010</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2022-010</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2022-010"/>
    <content type="html"><![CDATA[<strong>Published: 2022-03-10</strong><br/><strong>Updated: 2022-03-16</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
      The Istio control plane, istiod, is vulnerable to a request processing error, allowing
      a malicious attacker that sends a specially crafted message which results in the control plane
      crashing when the validating webhook for a cluster is exposed publicly. This endpoint is
      served over TLS port 15017 but does not require any authentication from the attacker.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_56" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>All Cloud Service Mesh versions are impacted by this CVE.</p>
<p>Note: If you are using Managed Control Plane, this vulnerability has already been fixed
          and you are not impacted.</p>
<strong>Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.12.5-asm.0</li>
<li>1.11.8-asm.0</li>
<li>1.10.6-asm.2</li>
</ul>
<p>
           If you're using Cloud Service Mesh v1.9 or below, your release has reached end of life
           and is no longer supported. These CVE fixes have not been backported. You should upgrade
           to Cloud Service Mesh 1.10 or above.
       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/istio/istio/security/advisories/GHSA-8w5h-qr4r-2h6g">CVE-2022-24726</a>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2022-007</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2022-007</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2022-007"/>
    <content type="html"><![CDATA[<strong>Published: 2022-02-22</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Istiod crashes upon receiving requests with a specially crafted <code dir="ltr" translate="no">authorization</code>
       header.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_57" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than

             1.12.4-asm.1,

             1.11.7-asm.1,

             or 1.10.6-asm.1.

         </li>
</ul>
<p>Note: If you are using Managed Control Plane, this vulnerability has already been fixed
          and you are not impacted.</p>
<strong>Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.12.4-asm.1</li>
<li>1.11.7-asm.1</li>
<li>1.10.6-asm.1</li>
</ul>
<p>

           If you're using Cloud Service Mesh v1.9 or below, your release has reached end of life
           and is no longer supported. These CVE fixes have not been backported. You should upgrade
           to Cloud Service Mesh 1.10 or above.

       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f">CVE-2022-23635</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Potential null pointer dereference when using JWT filter <code dir="ltr" translate="no">safe_regex</code> match.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_58" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than

             1.12.4-asm.1,

             1.11.7-asm.1,

             or 1.10.6-asm.1.

         </li>
<li>Although Cloud Service Mesh do not support Envoy filters, you could be impacted if you use
             JWT filter regex.</li>
</ul>
<strong>Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.12.4-asm.1</li>
<li>1.11.7-asm.1</li>
<li>1.10.6-asm.1</li>
</ul>
<p>

           If you're using Cloud Service Mesh v1.9 or below, your release has reached end of life and is
           no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh 1.10 or above.

       </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p">CVE-2021-43824</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Use-after-free when response filters increase response data, and increased data exceeds
       downstream buffer limits.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_59" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than

             1.12.4-asm.1,

             1.11.7-asm.1,

             or 1.10.6-asm.1.

         </li>
<li>Although Cloud Service Mesh do not support Envoy filters, you could be impacted if you use a
             decompress filter.</li>
</ul>
<strong>Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.12.4-asm.1</li>
<li>1.11.7-asm.1</li>
<li>1.10.6-asm.1</li>
</ul>
<p>

           If you're using Cloud Service Mesh v1.9 or below, your release has reached end of life and is
           no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh 1.10 or above.

       </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh">CVE-2021-43825</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Use-after-free when tunneling TCP over HTTP, if downstream disconnects during upstream
       connection establishment.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_60" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than

             1.12.4-asm.1,

             1.11.7-asm.1,

             or 1.10.6-asm.1.

         </li>
<li>Although Cloud Service Mesh do not support Envoy filters, you could be impacted if you use a
             tunneling filter.</li>
</ul>
<strong>Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.12.4-asm.1</li>
<li>1.11.7-asm.1</li>
<li>1.10.6-asm.1</li>
</ul>
<p>

           If you're using Cloud Service Mesh v1.9 or below, your release has reached end of life and is
           no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh 1.10 or above.

       </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf">CVE-2021-43826</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Incorrect configuration handling allows mTLS session re-use without re-validation after
       validation settings have changed.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_61" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than

             1.12.4-asm.1,

             1.11.7-asm.1,

             or 1.10.6-asm.1.

         </li>
<li>All Cloud Service Mesh services using mTLS are impacted by this CVE.</li>
</ul>
<strong>Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.12.4-asm.1</li>
<li>1.11.7-asm.1</li>
<li>1.10.6-asm.1</li>
</ul>
<p>

           If you're using Cloud Service Mesh v1.9 or below, your release has reached end of life and is
           no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh 1.10 or above.

       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283">CVE-2022-21654</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Incorrect handling of internal redirects to routes with a direct response entry.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_62" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than

             1.12.4-asm.1,

             1.11.7-asm.1,

             or 1.10.6-asm.1.

         </li>
<li>Although Cloud Service Mesh do not support Envoy filters, you could be impacted if you use a
             direct response filter.</li>
</ul>
<strong>Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.12.4-asm.1</li>
<li>1.11.7-asm.1</li>
<li>1.10.6-asm.1</li>
</ul>
<p>

           If you're using Cloud Service Mesh v1.9 or below, your release has reached end of life and is
           no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh 1.10 or above.

       </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg">CVE-2022-21655</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
       Stack exhaustion when a cluster is deleted via Cluster Discovery Service.
       </p>
<h4 data-text="What should I do?" id="what-should-i-do_63" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than

             1.12.4-asm.1 or

             1.11.7-asm.1.

         </li>
</ul>
<strong>Mitigation</strong>
<p>
       Upgrade your cluster to one of the following patched versions:
       </p>
<ul>
<li>1.12.4-asm.1</li>
<li>1.11.7-asm.1</li>
</ul>
<p>

           If you're using Cloud Service Mesh v1.9 or below, your release has reached end of life and is
           no longer supported. These CVE fixes have not been backported. You should upgrade to
           Cloud Service Mesh 1.10 or above.

       </p>
</td>
<td><p>Medium</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-9vp2-4cp7-vvxf">CVE-2022-23606</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2021-016</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2021-016</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2021-016"/>
    <content type="html"><![CDATA[<strong>Published: 2021-08-24</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
      Istio contains a remotely exploitable vulnerability where an HTTP request with a <a class="external" href="https://en.wikipedia.org/wiki/URI_fragment">fragment</a> (a section in the end of a URI that begins with a <code dir="ltr" translate="no">#</code> character) in the URI path could bypass Istio’s URI path-based authorization policies.
      </p>
<p>
      For example, an Istio authorization policy <a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#AuthorizationPolicy-Action">denies</a> requests sent to the URI path <code dir="ltr" translate="no">/user/profile</code>. In the vulnerable versions, a request with the URI path <code dir="ltr" translate="no">/user/profile#section1</code> bypasses the deny policy and routes to the backend (with the normalized URI path <code dir="ltr" translate="no">/user/profile%23section1</code>), which leads to a security incident.
      </p>
<p>
      This fix depends on a fix in Envoy, which is associated with <a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9">CVE-2021-32779</a>.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_64" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than 1.7.8-asm.10, 1.8.6-asm.8, 1.9.8-asm.1, and 1.10.4-asm.6.</li>
<li>It uses authorization policies with <code dir="ltr" translate="no"><a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#AuthorizationPolicy-Action">DENY actions</a></code> and <code dir="ltr" translate="no"><a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#Operation">operation.paths</a></code>, or <code dir="ltr" translate="no"><a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#AuthorizationPolicy-Action">ALLOW actions</a></code> and <code dir="ltr" translate="no"><a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#Operation">operation.notPaths</a></code>.</li>
</ul>
<strong>Mitigation</strong>
<p>
      Upgrade your cluster to one of the following patched versions:
      </p>
<ul>
<li>1.10.4-asm.6</li>
<li>1.9.8-asm.1</li>
<li>1.8.6-asm.8</li>
<li>1.7.8-asm.10</li>
</ul>
<p>
      With the new versions, the fragment part of the request’s URI is removed before the authorization and routing. This prevents a request with a fragment in its URI from bypassing authorization policies which are based on the URI without the fragment part.
      </p>
<strong>Opt-out</strong>
<p>
      If you opt-out of this new behavior, the fragment section in the URI is kept. To opt-out, you can configure your installation as follows:
      </p>
<div></div><devsite-code><pre class="devsite-click-to-copy" dir="ltr" is-upgraded="" translate="no">
apiVersion: install.istio.io/v1alpha1
kind: IstioOperator
metadata:
  name: opt-out-fragment-cve-fix
  namespace: istio-system
spec:
  meshConfig:
    defaultConfig:
      proxyMetadata:
        HTTP_STRIP_FRAGMENT_FROM_PATH_UNSAFE_IF_DISABLED: "false"
</pre></devsite-code>
<p>
      Note: Opting out of this behavior makes your cluster vulnerable to this CVE.
      </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/istio/istio/security/advisories/GHSA-hqxw-mm44-gc4r">CVE-2021-39156</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
      Istio contains a remotely exploitable vulnerability where an HTTP request could potentially bypass an Istio authorization policy when using rules based on <code dir="ltr" translate="no">hosts</code> or <code dir="ltr" translate="no">notHosts</code>.
      </p>
<p>
      In the vulnerable versions, the Istio authorization policy compares the HTTP <code dir="ltr" translate="no">Host</code> or <code dir="ltr" translate="no">:authority</code> headers in a case-sensitive manner, which is inconsistent with <a class="external" href="https://datatracker.ietf.org/doc/html/rfc4343">RFC 4343</a>. For example, the user could have an authorization policy that rejects requests with host <code dir="ltr" translate="no">secret.com</code>, but the attacker can bypass this by sending the request at hostname <code dir="ltr" translate="no">Secret.com</code>. The routing flow routes the traffic to the backend for <code dir="ltr" translate="no">secret.com</code>, which causes a security incident.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_65" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than 1.7.8-asm.10, 1.8.6-asm.8, 1.9.8-asm.1, and 1.10.4-asm.6.</li>
<li>It uses authorization policies with <code dir="ltr" translate="no"><a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#AuthorizationPolicy-Action">DENY actions</a></code> based on <code dir="ltr" translate="no"><a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#Operation">operation.hosts</a></code> or <code dir="ltr" translate="no"><a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#AuthorizationPolicy-Action">ALLOW actions</a></code> based on <code dir="ltr" translate="no"><a class="external" href="https://istio.io/latest/docs/reference/config/security/authorization-policy/#Operation">operation.notHosts</a></code>.</li>
</ul>
<strong>Mitigation</strong>
<p>
      Upgrade your cluster to one of the following patched versions:
      </p>
<ul>
<li>1.10.4-asm.6</li>
<li>1.9.8-asm.1</li>
<li>1.8.6-asm.8</li>
<li>1.7.8-asm.10</li>
</ul>
<p>
      This mitigation makes sure that the HTTP <code dir="ltr" translate="no">Host</code> or <code dir="ltr" translate="no">:authority</code> headers are evaluated against the <code dir="ltr" translate="no">hosts</code> or <code dir="ltr" translate="no">notHosts</code> specs in the authorization policies in a case-insensitive manner.
      </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j">CVE-2021-39155</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
      Envoy contains a remotely exploitable vulnerability that an HTTP request with multiple value headers could do an incomplete authorization policy check when the <code dir="ltr" translate="no">ext_authz</code> extension is used. When a request header contains multiple values, the external authorization server will only see the last value of the given header.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_66" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than 1.7.8-asm.10, 1.8.6-asm.8, 1.9.8-asm.1, and 1.10.4-asm.6.</li>
<li>It uses the <a class="external" href="https://istio.io/latest/docs/tasks/security/authorization/authz-custom/">External Authorization</a> feature.</li>
</ul>
<strong>Mitigation</strong>
<p>
      Upgrade your cluster to one of the following patched versions:
      </p>
<ul>
<li>1.10.4-asm.6</li>
<li>1.9.8-asm.1</li>
<li>1.8.6-asm.8</li>
<li>1.7.8-asm.10</li>
</ul>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h">CVE-2021-32777</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
      Envoy contains a remotely exploitable vulnerability that affects Envoy's <code dir="ltr" translate="no">decompressor</code>, <code dir="ltr" translate="no">json-transcoder</code>, or <code dir="ltr" translate="no">grpc-web</code> extensions or proprietary extensions that modify and increase the size of request or response bodies. Modifying and increasing the size of the body in an Envoy’s extension beyond the internal buffer size could lead to Envoy accessing deallocated memory and terminating abnormally.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_67" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if both of the following are true:</p>
<ul>
<li>It uses Cloud Service Mesh patch versions earlier than 1.7.8-asm.10, 1.8.6-asm.8, 1.9.8-asm.1, and 1.10.4-asm.6.</li>
<li>It uses <a class="external" href="https://istio.io/latest/docs/reference/config/networking/envoy-filter/"><code dir="ltr" translate="no">EnvoyFilters</code></a>.</li>
</ul>
<strong>Mitigation</strong>
<p>
      Upgrade your cluster to one of the following patched versions:
      </p>
<ul>
<li>1.10.4-asm.6</li>
<li>1.9.8-asm.1</li>
<li>1.8.6-asm.8</li>
<li>1.7.8-asm.10</li>
</ul>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-5vhv-gp9v-42qv">CVE-2021-32781</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
      Envoy contains a remotely exploitable vulnerability where an Envoy client opening and then resetting a large number of HTTP/2 requests could lead to excessive CPU consumption.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_68" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh patch versions earlier than 1.7.8-asm.10, 1.8.6-asm.8, 1.9.8-asm.1, and 1.10.4-asm.6.</p>
<strong>Mitigation</strong>
<p>
      Upgrade your cluster to one of the following patched versions:
      </p>
<ul>
<li>1.10.4-asm.6</li>
<li>1.9.8-asm.1</li>
</ul>
<p>
      Note: If you are using Cloud Service Mesh 1.8 or earlier, please upgrade to the latest patch versions of Cloud Service Mesh 1.9 and above to mitigate this vulnerability.
      </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc">CVE-2021-32778</a><br/>
</p>
</td>
</tr>
</tbody>
</table><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
      Envoy contains a remotely exploitable vulnerability where an untrusted upstream service could cause Envoy to terminate abnormally by sending the <code dir="ltr" translate="no">GOAWAY</code> frame followed by the <code dir="ltr" translate="no">SETTINGS</code> frame with the <code dir="ltr" translate="no">SETTINGS_MAX_CONCURRENT_STREAMS</code> parameter set to <code dir="ltr" translate="no">0</code>.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_69" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if it uses Cloud Service Mesh 1.10 with a patch version earlier than 1.10.4-asm.6.</p>
<strong>Mitigation</strong>
<p>
      Upgrade your cluster to the following patch version:
      </p>
<ul>
<li>1.10.4-asm.6</li>
</ul>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8">CVE-2021-32780</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2021-012</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2021-012</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2021-012"/>
    <content type="html"><![CDATA[<strong>Published: 2021-06-24</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
      The <a class="external" href="https://istio.io/latest/docs/tasks/traffic-management/ingress/secure-ingress/">Istio secure <code dir="ltr" translate="no">Gateway</code></a>
      or
      <a class="external" href="https://istio.io/latest/docs/reference/config/networking/destination-rule/">workloads using the <code dir="ltr" translate="no">DestinationRule</code></a>
      can load TLS private keys and certificates from Kubernetes secrets via the <code dir="ltr" translate="no">credentialName</code>
      configuration. From Istio 1.8 and above, the secrets are read from <code dir="ltr" translate="no">istiod</code> and
      conveyed to gateways and workloads via XDS.
      </p>
<p>
      Normally, a gateway or workload deployment is only able to access TLS certificates and private
      keys stored in the secret within its namespace. However, a bug in <code dir="ltr" translate="no">istiod</code> allows a
      client authorized to access the Istio XDS API to retrieve any TLS certificate and private keys
      cached in <code dir="ltr" translate="no">istiod</code>. This security vulnerability only impacts the 1.8 and 1.9 minor
      releases of Cloud Service Mesh.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_70" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>Your cluster is impacted if ALL of the following conditions are true:</p>
<ul>
<li>It is using a 1.9.x version prior to 1.9.6-asm.1 or a 1.8.x prior to 1.8.6-asm.4.</li>
<li>It has defined <a class="external" href="https://istio.io/latest/docs/tasks/traffic-management/ingress/secure-ingress/"><code dir="ltr" translate="no">Gateways</code></a>
        or <a class="external" href="https://istio.io/latest/docs/reference/config/networking/destination-rule/"><code dir="ltr" translate="no">DestinationRules</code></a>
        with the <code dir="ltr" translate="no">credentialName</code> field specified.
        </li>
<li>It does not specify the <code dir="ltr" translate="no">istiod</code> flag <code dir="ltr" translate="no">PILOT_ENABLE_XDS_CACHE=false</code>.</li>
</ul>
<strong>Mitigation</strong>
<p>
      Upgrade your cluster to one of the following patched versions:
      </p>
<ul>
<li>1.9.6-asm.1</li>
<li>1.8.6-asm.4</li>
</ul>
<p>
</p>
      If an upgrade isn't feasible, you can mitigate this vulnerability by disabling <code dir="ltr" translate="no">istiod</code> caching.
      You can disable caching by setting the <code dir="ltr" translate="no">istiod</code> environment variable to
      <code dir="ltr" translate="no">PILOT_ENABLE_XDS_CACHE=false</code>. System and <code dir="ltr" translate="no">istiod</code> performance could be
      impacted because this disables XDS caching.
    </td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34824">CVE-2021-34824</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2021-008</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2021-008</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2021-008"/>
    <content type="html"><![CDATA[<strong>Published: 2021-05-17</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
        Istio contains a remotely exploitable vulnerability where an external client can access
        unexpected services in the cluster, bypassing authorization checks, when a gateway is
        configured with AUTO_PASSTHROUGH routing configuration.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_71" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
        This vulnerability impacts only usage of the AUTO_PASSTHROUGH Gateway type, which is
        typically only used in multi-network, multi-cluster deployments.
      </p>
<p>
        Detect the TLS mode of all Gateways in the cluster with the following command:
      </p>
<div></div><devsite-code><pre class="devsite-click-to-copy" dir="ltr" is-upgraded="" translate="no">
kubectl get gateways.networking.istio.io -A -o \
  "custom-columns=NAMESPACE:.metadata.namespace, \
  NAME:.metadata.name,TLS_MODE:.spec.servers[*].tls.mode"
</pre></devsite-code>
<p>
        If the output shows any AUTO_PASSTHROUGH Gateways, you could be impacted.
      </p>
<strong>Mitigation</strong>
<p>
        Update your clusters to the latest Cloud Service Mesh versions:
      </p>
<ul>
<li>1.9.5-asm.2</li>
<li>1.8.6-asm.3</li>
<li>1.7.8-asm.8</li>
</ul>
<p>
        * Note: The rollout of the Cloud Service Mesh
        <a href="https://docs.cloud.google.com/service-mesh/docs/managed-control-plane">Managed Control Plane</a> (available only
        in 1.9.x versions) will complete in the next few days.
      </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31921">CVE-2021-31921</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2021-007</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2021-007</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2021-007"/>
    <content type="html"><![CDATA[<strong>Published: 2021-05-17</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
        Istio contains a remotely exploitable vulnerability where an HTTP request path with multiple
        slashes or escaped slash characters (%2F or %5C) could potentially bypass an Istio
        authorization policy when path based authorization rules are used.
      </p>
<p>
        In a scenario where an Istio cluster administrator defines an authorization DENY policy to
        reject the request at path <code dir="ltr" translate="no">"/admin"</code>, a request sent to the URL path
        <code dir="ltr" translate="no">"//admin"</code> will NOT be rejected by the authorization policy.
      </p>
<p>
        According to the
        <a class="external" href="https://tools.ietf.org/html/rfc3986#section-6">RFC 3986</a>,
        the path <code dir="ltr" translate="no">"//admin"</code> with multiple slashes should technically be treated as a
        different path from the <code dir="ltr" translate="no">"/admin"</code>. However, some backend services choose to
        normalize the URL paths by merging multiple slashes to a single slash. This can result in a
        bypass of the authorization policy (<code dir="ltr" translate="no">"//admin"</code> does not match
        <code dir="ltr" translate="no">"/admin"</code>), and a user can access the resource at path <code dir="ltr" translate="no">"/admin"</code> in
        the backend.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_72" tabindex="-1">What should I do?</h4>
<strong>Check if your clusters are impacted</strong>
<p>
        Your cluster is impacted by this vulnerability if you have authorization policies using
        "ALLOW action + notPaths field" or "DENY action + paths field" patterns. These patterns are
        vulnerable to unexpected policy bypasses and you should upgrade to fix the security issue
        ASAP.
      </p>
<p>
        The following is an example of vulnerable policy that uses "DENY action + paths field"
        pattern:
      </p>
<div></div><devsite-code><pre dir="ltr" is-upgraded="" translate="no">
apiVersion: security.istio.io/v1beta1
kind: AuthorizationPolicy
metadata:
  name: deny-path-admin
spec:
  action: DENY
  rules:
  - to:
    - operation:
        paths: ["/admin"]
</pre></devsite-code>
<p>
        The following is another example of vulnerable policy that uses "ALLOW action + notPaths
        field" pattern:
      </p>
<div></div><devsite-code><pre dir="ltr" is-upgraded="" translate="no">
apiVersion: security.istio.io/v1beta1
kind: AuthorizationPolicy
metadata:
  name: allow-path-not-admin
spec:
  action: ALLOW
  rules:
  - to:
    - operation:
        notPaths: ["/admin"]
</pre></devsite-code>
<p>
        Your cluster is not impacted by this vulnerability if:
      </p>
<ul>
<li>You don't have authorization policies.</li>
<li>Your authorization policies don't define <code dir="ltr" translate="no">paths</code> or <code dir="ltr" translate="no">notPaths</code> fields.</li>
<li>Your authorization policies use "ALLOW action + paths field" or "DENY action + notPaths
            field" patterns. These patterns could only cause unexpected rejection instead of policy
            bypasses.</li>
<p>
        Upgrading is optional for these cases.
      </p>
</ul>
<strong>Mitigation</strong>
<p>
        Update your clusters to the latest supported Cloud Service Mesh versions*. These versions support
        configuring the Envoy proxies in the system with more normalization options:
      </p>
<ul>
<li>1.9.5-asm.2</li>
<li>1.8.6-asm.3</li>
<li>1.7.8-asm.8</li>
</ul>
<p>
        * Note: The rollout of the Cloud Service Mesh
        <a href="https://docs.cloud.google.com/service-mesh/docs/managed-control-plane">Managed Control Plane</a> (available only
        in 1.9.x versions) will complete in the next few days.
      </p>
<p>
        Follow the
        <a class="external" href="https://istio.io/latest/docs/ops/best-practices/security/#authorization-policies">Istio security best practices guide</a>
        to configure your authorization policies.
      </p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31920">CVE-2021-31920</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>

  <entry>
    <title>GCP-2021-004</title>
    <id>tag:google.com,2016:cloud-service-mesh-security-bulletins#gcp-2021-004</id>
    <updated>2026-03-11T07:04:33.951765+00:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/service-mesh/docs/security-bulletins#gcp-2021-004"/>
    <content type="html"><![CDATA[<strong>Published: 2021-05-06</strong><table>
<thead>
<tr>
<th width="70%">Description</th>
<th>Severity</th>
<th>Notes</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>
        The Envoy and Istio projects recently
        <a href="https://istio.io/latest/news/security/istio-security-2021-003/">announced</a>
        several new security vulnerabilities (CVE-2021-28682, CVE-2021-28683, and CVE-2021-29258),
        that could allow an attacker to crash Envoy and potentially render parts of the cluster
        offline and unreachable.
      </p>
<p>
        This impacts delivered services such as Cloud Service Mesh.
      </p>
<h4 data-text="What should I do?" id="what-should-i-do_73" tabindex="-1">What should I do?</h4>
<p>To fix these vulnerabilities, upgrade your Cloud Service Mesh bundle to one of the following patched versions:</p>
<ul>
<li>1.9.3-asm.2</li>
<li>1.8.5-asm.2</li>
<li>1.7.8-asm.1</li>
<li>1.6.14-asm.2</li>
</ul>
<p>For more information, see the <a href="https://docs.cloud.google.com/service-mesh/docs/release-notes#April_20_2021">Cloud Service Mesh release notes</a>.</p>
</td>
<td><p>High</p></td>
<td>
<p>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-r22g-5f3x-xjgg">CVE-2021-28682</a><br/>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-xw4q-6pj2-5gfg">CVE-2021-28683</a><br/>
<a class="external" href="https://github.com/envoyproxy/envoy/security/advisories/GHSA-rqvq-hxw5-776j">CVE-2021-29258</a><br/>
</p>
</td>
</tr>
</tbody>
</table>]]>
    </content>
  </entry>


</feed>
