Moderate severityNVD Advisory· Published Feb 20, 2024· Updated Aug 1, 2024
Cilium has unencrypted ingress/health traffic when using Wireguard transparent encryption
CVE-2024-25630
Description
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For Cilium users who are using CRDs to store Cilium state (the default configuration) and Wireguard transparent encryption, traffic to/from the Ingress and health endpoints is not encrypted. This issue affects Cilium v1.14 before v1.14.7 and has been patched in Cilium v1.14.7. There is no workaround to this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/cilium/ciliumGo | >= 1.14.0, < 1.14.7 | 1.14.7 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-7496-fgv9-xw82ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-25630ghsaADVISORY
- docs.cilium.io/en/stable/security/network/encryption-wireguard/ghsax_refsource_MISCWEB
- github.com/cilium/cilium/releases/tag/v1.14.7ghsax_refsource_MISCWEB
- github.com/cilium/cilium/security/advisories/GHSA-7496-fgv9-xw82ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.