CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-0752: Envoyproxy: openshift service mesh envoy http header sanitization bypass leading to dos and unauthorized access

Description

A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.

Classification

CVE ID: CVE-2025-0752

Affected Products

Vendor: Red Hat

Product: OpenShift Service Mesh 2

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 16.0% (scored less or equal to compared to others)

EPSS Date: 2025-02-27 (when was this score calculated)

References

https://access.redhat.com/security/cve/CVE-2025-0752
https://bugzilla.redhat.com/show_bug.cgi?id=2339115

Timeline