Service Proxy Vulnerability in Envoy Software by EnvoyProxy
CVE-2026-26310

5.9MEDIUM

Key Information:

Vendor

Envoyproxy

Status
Vendor
CVE Published:
10 March 2026

What is CVE-2026-26310?

A vulnerability has been identified in the Envoy service proxy affecting versions earlier than 1.37.1, 1.36.5, 1.35.8, and 1.34.13. The issue arises while calling Utility::getAddressWithPort with scoped IPv6 addresses, leading to a crash. This utility is invoked within the data plane by the original_src filter and the DNS filter, which could compromise the stability of services utilizing Envoy. The vulnerability has been addressed in the specified patched versions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

envoy >= 1.37.0, < 1.37.1 < 1.37.0, 1.37.1

envoy >= 1.36.0, < 1.36.5 < 1.36.0, 1.36.5

envoy >= 1.35.0, < 1.35.9 < 1.35.0, 1.35.9

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.