CVE-2023-27594
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/03/2023
Last modified:
07/11/2023
Description
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, under specific conditions, Cilium may misattribute the source IP address of traffic to a cluster, identifying external traffic as coming from the host on which Cilium is running. As a consequence, network policies for that cluster might be bypassed, depending on the specific network policies enabled.<br />
<br />
This issue only manifests when Cilium is routing IPv6 traffic and NodePorts are used to route traffic to pods. IPv6 and endpoint routes are both disabled by default.<br />
<br />
The problem has been fixed and is available on versions 1.11.15, 1.12.8, and 1.13.1. As a workaround, disable IPv6 routing.
Impact
Base Score 3.x
7.30
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:* | 1.11.15 (excluding) | |
| cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:* | 1.12.0 (including) | 1.12.8 (excluding) |
| cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:* | 1.13.0 (including) | 1.13.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



