Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-62504

CVE-2025-62504: Envoyproxy Envoy DoS Vulnerability

CVE-2025-62504 is a use-after-free DoS vulnerability in Envoyproxy Envoy's Lua filter that causes crashes when response body size exceeds configured limits. This article covers technical details, affected versions, and patches.

Published: April 14, 2026

CVE-2025-62504 Overview

CVE-2025-62504 is a use-after-free vulnerability affecting Envoy, a widely deployed open source edge and service proxy used extensively in cloud-native environments and service mesh architectures. The vulnerability exists in the Lua filter component and can be triggered when a Lua script executing in the response phase rewrites a response body so that its size exceeds the configured per_connection_buffer_limit_bytes (default 1MB). When this condition occurs, Envoy generates a local reply whose headers override the original response headers, leaving dangling references that cause a crash and result in denial of service.

Critical Impact

This use-after-free vulnerability can cause Envoy proxy instances to crash, resulting in denial of service for applications and microservices relying on Envoy for traffic management. Organizations running Envoy in production service mesh deployments may experience significant availability impacts.

Affected Products

  • Envoy versions earlier than 1.36.2
  • Envoy versions earlier than 1.35.6
  • Envoy versions earlier than 1.34.10
  • Envoy versions earlier than 1.33.12

Discovery Timeline

  • 2025-10-16 - CVE-2025-62504 published to NVD
  • 2025-10-29 - Last updated in NVD database

Technical Details for CVE-2025-62504

Vulnerability Analysis

This vulnerability is classified as CWE-416 (Use After Free), a memory corruption vulnerability type. The flaw resides in how Envoy handles response body modifications performed by Lua filter scripts during the response processing phase. When a Lua script modifies a response body to exceed the per_connection_buffer_limit_bytes threshold, Envoy's internal error handling mechanism generates a local reply. However, this process incorrectly overrides the original response headers without properly managing memory references, creating dangling pointers that lead to a use-after-free condition.

The attack can be performed remotely without authentication, requires no user interaction, and has low complexity to execute. The vulnerability specifically impacts availability—while there is no confidentiality or integrity impact, the denial of service condition can significantly affect production environments where Envoy serves as a critical infrastructure component.

Root Cause

The root cause is a memory safety flaw in Envoy's Lua filter implementation. When the response body size exceeds the configured buffer limits, the error handling path that generates local replies fails to properly manage the lifecycle of response header objects. The original response headers are overwritten by the local reply headers, but existing references to the original headers are not invalidated, resulting in dangling pointers that cause memory corruption when subsequently accessed.

Attack Vector

An attacker can exploit this vulnerability remotely over the network by crafting requests that trigger Lua scripts to generate oversized response bodies. The attack vector is network-based and does not require authentication or user interaction, making it accessible to remote unauthenticated attackers who can send requests through an Envoy proxy configured with Lua filters.

The exploitation scenario involves:

  1. Identifying an Envoy deployment using Lua filters in the response processing phase
  2. Crafting requests designed to trigger Lua scripts that modify response bodies
  3. Ensuring the modified response body exceeds the per_connection_buffer_limit_bytes threshold
  4. The resulting use-after-free condition causes Envoy to crash, denying service

The vulnerability manifests in the response body rewriting logic within the Lua filter. When the modified response exceeds buffer limits, Envoy's local reply generation creates dangling references to response headers that have been freed or overwritten. Technical details are available in the GitHub Security Advisory.

Detection Methods for CVE-2025-62504

Indicators of Compromise

  • Unexpected Envoy proxy crashes or restarts in environments using Lua filters
  • Core dumps or crash reports indicating use-after-free memory errors
  • Increased error rates or availability issues in services fronted by Envoy
  • Log entries indicating buffer limit exceeded conditions during response processing

Detection Strategies

  • Monitor Envoy access and error logs for patterns indicating buffer limit violations during Lua script execution
  • Implement health checks that detect unexpected Envoy process restarts or crashes
  • Use memory debugging tools in development environments to identify use-after-free conditions
  • Deploy application performance monitoring to detect service degradation patterns consistent with proxy crashes

Monitoring Recommendations

  • Enable detailed logging for Lua filter operations to capture response body size modifications
  • Configure alerting on Envoy process crash events or unexpected container restarts
  • Monitor memory usage patterns and crash frequencies across Envoy fleet deployments
  • Implement circuit breakers to detect and respond to repeated proxy failures

How to Mitigate CVE-2025-62504

Immediate Actions Required

  • Upgrade Envoy to patched versions: 1.36.2, 1.35.6, 1.34.10, or 1.33.12
  • Review Lua filter configurations for scripts that modify response bodies
  • Consider temporarily disabling Lua filters that perform response body modifications until patching is complete
  • Implement monitoring for Envoy crashes and unusual restart patterns

Patch Information

Security patches have been released by Envoyproxy to address this vulnerability. Organizations should upgrade to the following fixed versions based on their current deployment:

  • Version 1.36.x users: Upgrade to 1.36.2 or later
  • Version 1.35.x users: Upgrade to 1.35.6 or later
  • Version 1.34.x users: Upgrade to 1.34.10 or later
  • Version 1.33.x users: Upgrade to 1.33.12 or later

Detailed patch information is available in the Envoy Security Advisory.

Workarounds

  • Increase per_connection_buffer_limit_bytes to reduce the likelihood of triggering the condition (note: this does not fix the underlying memory safety flaw)
  • For HTTP/2 connections, increase initial_stream_window_size configuration
  • Increase per_request_buffer_limit_bytes or request_body_buffer_limit settings
  • Limit or audit Lua scripts that modify response bodies to ensure they do not produce oversized responses
bash
# Example configuration adjustment (workaround only - does not fix underlying vulnerability)
# Increase buffer limits in Envoy configuration
# listeners:
#   - name: listener_0
#     per_connection_buffer_limit_bytes: 10485760  # 10MB instead of default 1MB
#
# Note: Upgrading to patched versions is the recommended remediation

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechEnvoy

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-416
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2024-30255: Envoyproxy Envoy DoS Vulnerability

  • CVE-2026-41246: Contour Kubernetes Ingress RCE Vulnerability

  • CVE-2026-26308: Envoyproxy Envoy Auth Bypass Vulnerability

  • CVE-2026-26309: Envoyproxy Envoy Buffer Overflow Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English