{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T07:41:35.389","vulnerabilities":[{"cve":{"id":"CVE-2025-64763","sourceIdentifier":"security-advisories@github.com","published":"2025-12-03T18:15:47.037","lastModified":"2025-12-05T16:52:24.367","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, when Envoy is configured in TCP proxy mode to handle CONNECT requests, it accepts client data before issuing a 2xx response and forwards that data to the upstream TCP connection. If a forwarding proxy upstream from Envoy then responds with a non-2xx status, this can cause a de-synchronized CONNECT tunnel state. By default Envoy continues to allow early CONNECT data to avoid disrupting existing deployments. The envoy.reloadable_features.reject_early_connect_data runtime flag can be set to reject CONNECT requests that send data before a 2xx response when intermediaries upstream from Envoy may reject establishment of a CONNECT tunnel."},{"lang":"es","value":"Envoy es un proxy de borde/intermedio/servicio de alto rendimiento. En las versiones 1.33.12, 1.34.10, 1.35.6, 1.36.2 y anteriores, cuando Envoy está configurado en modo proxy TCP para manejar solicitudes CONNECT, acepta datos del cliente antes de emitir una respuesta 2xx y reenvía esos datos a la conexión TCP ascendente. Si un proxy de reenvío ascendente de Envoy responde con un estado que no es 2xx, esto puede causar un estado de túnel CONNECT desincronizado. Por defecto, Envoy continúa permitiendo datos CONNECT tempranos para evitar interrumpir las implementaciones existentes. El indicador de tiempo de ejecución 'envoy.reloadable_features.reject_early_connect_data' puede configurarse para rechazar solicitudes CONNECT que envían datos antes de una respuesta 2xx cuando los intermediarios ascendentes de Envoy pueden rechazar el establecimiento de un túnel CONNECT."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-693"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*","versionEndExcluding":"1.33.13","matchCriteriaId":"B303FFFE-9973-4E7E-8A8C-DE847B725534"},{"vulnerable":true,"criteria":"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*","versionStartIncluding":"1.34.0","versionEndExcluding":"1.34.11","matchCriteriaId":"4419A82D-995F-4DD0-BAE1-3825791245D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*","versionStartIncluding":"1.35.0","versionEndExcluding":"1.35.7","matchCriteriaId":"C50E067C-AE0D-4B14-A442-53603039EFCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*","versionStartIncluding":"1.36.0","versionEndExcluding":"1.36.3","matchCriteriaId":"B39C3DF2-E73F-4B66-9504-C24E329ACB54"}]}]}],"references":[{"url":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-rj35-4m94-77jh","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}