CVE Vulnerabilities

CVE-2025-64527

NULL Pointer Dereference

Published: Dec 03, 2025 | Modified: Dec 05, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu

Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy crashes when JWT authentication is configured with the remote JWKS fetching, allow_missing_or_failed is enabled, multiple JWT tokens are present in the request headers and the JWKS fetch fails. This is caused by a re-entry bug in the JwksFetcherImpl. When the first tokens JWKS fetch fails, onJwksError() callback triggers processing of the second token, which calls fetch() again on the same fetcher object. The original callbacks reset() then clears the second fetchs state (receiver_ and request_) which causes a crash when the async HTTP response arrives.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

Name Vendor Start Version End Version
Envoy Envoyproxy * 1.33.13 (excluding)
Envoy Envoyproxy 1.34.0 (including) 1.34.11 (excluding)
Envoy Envoyproxy 1.35.0 (including) 1.35.7 (excluding)
Envoy Envoyproxy 1.36.0 (including) 1.36.3 (excluding)

Potential Mitigations

References