CVE-2021-39204
moderate-risk
Published 2021-09-09
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
Do I need to act?
-
0.41% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (6)
Third Party Advisory
https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc
Third Party Advisory
https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r
Third Party Advisory
https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc
Third Party Advisory
https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r
38
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
10/34 · Low