Vulnerability Details CVE-2020-12604
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 61.9%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2020-12604
-
cpe:2.3:a:envoyproxy:envoy:-
-
cpe:2.3:a:envoyproxy:envoy:1.0.0
-
cpe:2.3:a:envoyproxy:envoy:1.1.0
-
cpe:2.3:a:envoyproxy:envoy:1.10.0
-
cpe:2.3:a:envoyproxy:envoy:1.11.0
-
cpe:2.3:a:envoyproxy:envoy:1.11.1
-
cpe:2.3:a:envoyproxy:envoy:1.11.2
-
cpe:2.3:a:envoyproxy:envoy:1.12.0
-
cpe:2.3:a:envoyproxy:envoy:1.12.1
-
cpe:2.3:a:envoyproxy:envoy:1.12.2
-
cpe:2.3:a:envoyproxy:envoy:1.12.3
-
cpe:2.3:a:envoyproxy:envoy:1.12.4
-
cpe:2.3:a:envoyproxy:envoy:1.13.2
-
cpe:2.3:a:envoyproxy:envoy:1.14.2
-
cpe:2.3:a:envoyproxy:envoy:1.2.0
-
cpe:2.3:a:envoyproxy:envoy:1.3.0
-
cpe:2.3:a:envoyproxy:envoy:1.4.0
-
cpe:2.3:a:envoyproxy:envoy:1.5.0
-
cpe:2.3:a:envoyproxy:envoy:1.6.0
-
cpe:2.3:a:envoyproxy:envoy:1.7.0
-
cpe:2.3:a:envoyproxy:envoy:1.7.1
-
cpe:2.3:a:envoyproxy:envoy:1.8.0
-
cpe:2.3:a:envoyproxy:envoy:1.9.0
-
cpe:2.3:a:envoyproxy:envoy:1.9.1