Calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter.
The crashing function is Utility::getAddressWithPort. The crash occurs if a string containing a scoped IPv6 address is passed to this function.
This vulnerability affects:
To reproduce the vulnerability:
original src filter in Envoy and provide a scoped IPv6 address as the original source.This is a Denial of Service (DoS) vulnerability. It impacts users who have the original src filter configured or whose Envoy instances resolve addresses from DNS responses that may contain scoped IPv6 addresses.
{
"github_reviewed_at": "2026-03-10T18:16:26Z",
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-20"
],
"nvd_published_at": "2026-03-10T20:16:36Z"
}