VYPR
Moderate severityNVD Advisory· Published Dec 3, 2025· Updated Dec 3, 2025

Envoy’s TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte

CVE-2025-66220

Description

Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/envoyproxy/envoyGo
>= 1.36.0, < 1.36.31.36.3
github.com/envoyproxy/envoyGo
>= 1.35.0, < 1.35.71.35.7
github.com/envoyproxy/envoyGo
>= 1.34.0, < 1.34.111.34.11
github.com/envoyproxy/envoyGo
< 1.33.131.33.13

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.