content/en/news/security/istio-security-2020-011/index.md
{{< security_bulletin >}}
Envoy, and subsequently Istio, is vulnerable to a newly discovered vulnerability:
%DOWNSTREAM_REMOTE_ADDRESS%) and
authorization policy (remoteIpBlocks and remote_ip) for non-HTTP network connections because they will use the incorrect proxy protocol downstream address.This issue does not affect HTTP connections. The address from X-Forwarded-For is also not affected.
Istio does not support proxy protocol, and the only way to enable it is to use a custom EnvoyFilter resource.
It is not tested in Istio and should be used at your own risk.
{{< boilerplate "security-vulnerability" >}}