{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-53271","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-11-19T20:08:14.482Z","datePublished":"2024-12-18T19:12:20.612Z","dateUpdated":"2024-12-18T21:34:22.425Z"},"containers":{"cna":{"title":"HTTP/1.1 multiple issues with envoy.reloadable_features.http1_balsa_delay_reset in envoy","problemTypes":[{"descriptions":[{"cweId":"CWE-670","lang":"en","description":"CWE-670: Always-Incorrect Control Flow Implementation","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f","tags":["x_refsource_CONFIRM"],"url":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f"},{"name":"https://github.com/envoyproxy/envoy/commit/da56f6da63079baecef9183436ee5f4141a59af8","tags":["x_refsource_MISC"],"url":"https://github.com/envoyproxy/envoy/commit/da56f6da63079baecef9183436ee5f4141a59af8"}],"affected":[{"vendor":"envoyproxy","product":"envoy","versions":[{"version":">= 1.31.0, < 1.31.5","status":"affected"},{"version":">= 1.32.0, < 1.32.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-12-18T19:12:20.612Z"},"descriptions":[{"lang":"en","value":"Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy  does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue."}],"source":{"advisory":"GHSA-rmm5-h2wv-mg4f","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-18T21:32:16.518571Z","id":"CVE-2024-53271","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-18T21:34:22.425Z"}}]}}