CVSS 3.1 Score 8.6 of 10 (high)


Published Feb 9, 2024
Updated: Feb 15, 2024


CVE-2024-23324 is a vulnerability that affects various products, including Envoy, a high-performance edge/middle/service proxy. The vulnerability allows downstream clients to bypass external authentication by forcing invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks. This can occur when the failure_mode_allow is set to true. The issue has been addressed in released versions 1.29.1, 1.28.1, 1.27.3, and 1.26.7 of Envoy, and users are advised to upgrade to these versions to remediate the vulnerability. It is categorized as a high-risk vulnerability with a base severity score of 8.6 out of 10 and a high impact on confidentiality. No known workarounds exist for this vulnerability.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-23324 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options