content/en/news/security/istio-security-2024-001/index.md
{{< security_bulletin >}}
Note: At the time of publishing, the below security advisories have not yet been published, but should be published shortly.
The majority of exploitable behavior is related to the use of PROXY Protocol, primarily used in gateway scenarios. If you or your users have PROXY Protocol enabled, either via EnvoyFilter or proxy config annotations, there is potential exposure.
Aside from the use of PROXY protocol, the usage of the %DOWNSTREAM_PEER_IP_SAN% command operator for access logs has potential exposure.