Cilium has possible unencrypted traffic between nodes when using WireGuard and L7 policies
Description
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Starting in version 1.14.0 and prior to versions 1.14.8 and 1.15.2, In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies Wireguard-eligible traffic that is sent between a node's Envoy proxy and pods on other nodes is sent unencrypted and Wireguard-eligible traffic that is sent between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.14.8 and 1.15.2 in in native routing mode (routingMode=native) and in Cilium 1.14.4 in tunneling mode (routingMode=tunnel). Not that in tunneling mode, encryption.wireguard.encapsulate must be set to true. There is no known workaround for this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/cilium/ciliumGo | >= 1.14.0, < 1.14.8 | 1.14.8 |
github.com/cilium/ciliumGo | >= 1.15.0, < 1.15.2 | 1.15.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-v6q2-4qr3-5cw6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-28250ghsaADVISORY
- github.com/cilium/cilium/releases/tag/v1.13.13ghsax_refsource_MISCWEB
- github.com/cilium/cilium/releases/tag/v1.14.8ghsax_refsource_MISCWEB
- github.com/cilium/cilium/releases/tag/v1.15.2ghsax_refsource_MISCWEB
- github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.