Cyber Posture

CVE-2026-26310

MediumPublic PoC

Published: 10 March 2026

Published
10 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0001 0.9th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26310 is a medium-severity Improper Input Validation (CWE-20) vulnerability in Envoyproxy Envoy. Its CVSS base score is 5.9 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 0.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-20

Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.

addresses: CWE-20

Security testing and evaluation at multiple SDLC stages directly detects missing or flawed input validation, with the required remediation process ensuring fixes are applied.

addresses: CWE-20

Directly implements checks on information inputs to reject invalid data before processing.

addresses: CWE-20

Spam protection mechanisms perform filtering and detection on inbound/outbound messages, directly compensating for missing or weak input validation of unsolicited content.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Remote network-accessible crash via improper IPv6 input validation in public-facing Envoy proxy directly maps to exploitation of public-facing apps for DoS (T1190) and application/system exploitation causing endpoint DoS (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. This…

more

vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.

Deeper analysisAI

CVE-2026-26310 is an availability-impacting vulnerability in Envoy, a high-performance edge/middle/service proxy. In versions prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling the Utility::getAddressWithPort function with a scoped IPv6 address triggers a crash. This utility is invoked in the data plane by the original_src filter and the dns filter.

Network-accessible attackers with no privileges or user interaction required can exploit this issue, though it demands high attack complexity. Successful exploitation causes a denial-of-service condition via proxy crash, with no impact on confidentiality or integrity, as reflected in its CVSS v3.1 base score of 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

The vulnerability, linked to CWE-20 (Improper Input Validation), is addressed in Envoy releases 1.37.1, 1.36.5, 1.35.8, and 1.34.13. Practitioners should upgrade affected deployments promptly. Additional details are available in the Envoy security advisory at https://github.com/envoyproxy/envoy/security/advisories/GHSA-3cw6-2j68-868p.

Details

CWE(s)

Affected Products

envoyproxy
envoy
1.37.0 · ≤ 1.34.13 · 1.35.0 — 1.35.8 · 1.36.0 — 1.36.5

CVEs Like This One

CVE-2026-26330Same product: Envoyproxy Envoy
CVE-2025-30157Same product: Envoyproxy Envoy
CVE-2026-26308Same product: Envoyproxy Envoy
CVE-2026-26154Shared CWE-20
CVE-2025-20142Shared CWE-20
CVE-2025-59895Shared CWE-20
CVE-2026-30077Shared CWE-20
CVE-2025-15606Shared CWE-20
CVE-2026-26314Shared CWE-20
CVE-2025-71003Shared CWE-20

References